Weike Wang
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2023
IEICE Trans. Electron., March, 2023
Hardware-Based Software Control Flow Integrity: Review on the State-of-the-Art Implementation Technology.
IEEE Access, 2023
Proceedings of the 9th International Symposium on System Security, Safety, and Reliability, 2023
2022
Knowl. Based Syst., 2022
An Ultra-Low Complexity Early Stopping Criterion for Belief Propagation Polar Code Decoder.
IEEE Commun. Lett., 2022
Proceedings of the Device Research Conference, 2022
2021
Improved modeling of flicker noise including velocity saturation effect in FinFETs and experimental validation.
Microelectron. J., 2021
Distributed Adaptive Bipartite Time-Varying Formation Control for Heterogeneous Unknown Nonlinear Multi-Agent Systems.
IEEE Access, 2021
2019
Data Communication Security Based on Novel Reversible Mean Shift Steganography Algorithm.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019
2018
A Fine-Grained Hardware Security Approach for Runtime Code Integrity in Embedded Systems.
J. Univers. Comput. Sci., 2018
IET Comput. Digit. Tech., 2018
IEICE Electron. Express, 2018
IEEE Access, 2018
Proceedings of the 2nd International Conference on Computer Science and Application Engineering, 2018
2017
Track fusion based on threshold factor classification algorithm in wireless sensor networks.
Int. J. Commun. Syst., 2017
Proceedings of the IEEE 60th International Midwest Symposium on Circuits and Systems, 2017
Proceedings of the International Conference on Software Security and Assurance, 2017
2016
A Universal Hardware-Driven PVT and Layout-Aware Predictive Failure Analytics for SRAM.
IEEE Trans. Very Large Scale Integr. Syst., 2016
2015
Polarity Searching for MPRM Logic Circuit Based on Improved Adaptive Genetic Algorithm.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Optimization of Elliptic Curve Cryptography Resisting Power Attack Scalar Multiplication Algorithm in Security System on Chip.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Proceedings of the 28th IEEE International System-on-Chip Conference, 2015
2013
Proceedings of the IEEE 10th International Conference on ASIC, 2013
2012
2007
Pointwise convergence to a Maxwellian for a Broadwell model with a supersonic boundary.
Networks Heterog. Media, 2007