Follow
Weike Wang
Weike Wang
Shandong University of Science and Technology
Verified email at sdust.edu.cn
Title
Cited by
Cited by
Year
A security design for the detecting of buffer overflow attacks in IoT device
B Xu, W Wang, Q Hao, Z Zhang, P Du, T Xia, H Li, X Wang
IEEE Access 6, 72862-72869, 2018
322018
Hardware-enhanced protection for the runtime data security in embedded systems
W Wang, X Zhang, Q Hao, Z Zhang, B Xu, H Dong, T Xia, X Wang
Electronics 8 (1), 52, 2019
202019
Mcvp-noc: Many-core virtual platform with networks-on-chip support
D Zhang, X Zeng, Z Wang, W Wang, X Chen
2013 IEEE 10th International Conference on ASIC, 1-4, 2013
82013
An architectural-enhanced secure embedded system with a novel hybrid search scheme
W Wang, M Liu, P Du, Z Zhao, Y Tian, Q Hao, X Wang
2017 International Conference on Software Security and Assurance (ICSSA …, 2017
72017
Track fusion based on threshold factor classification algorithm in wireless sensor networks
X Wang, T Wang, S Chen, R Fan, Y Xu, W Wang, H Li, T Xia
International Journal of Communication Systems 30 (7), e3164, 2017
72017
An ultra-low complexity early stopping criterion for belief propagation polar code decoder
C Chen, X Zhang, Y Liu, W Wang, Q Zeng
IEEE Communications Letters 26 (4), 723-727, 2022
62022
A Fine-Grained Hardware Security Approach for Runtime Code Integrity in Embedded Systems.
X Wang, W Wang, B Xu, P Du, L Li, M Liu
J. Univers. Comput. Sci. 24 (4), 515-536, 2018
62018
PAOA: A power and area optimization approach of reed-muller logic circuits
X Wang, M Li, Z He, W Wang, C Zhou, Z Zhao
2017 IEEE 60th International Midwest Symposium on Circuits and Systems …, 2017
52017
Hardware-assisted monitoring for code security in embedded system
X Wang, Q Shen, P Du, R Zhang, W Wang, L Li, B Xu, H Ji
2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 …, 2015
52015
Polarity searching for MPRM logic circuit based on improved adaptive genetic algorithm
X Wang, R Zhang, W Wang, Z He, L Li, Q Shen, L Ruan, L Xiao
2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 …, 2015
42015
A new ECC scalar multiplication algorithm with randomized power consumption
L Wang, W Wang, R Zhang, X Wang
2014 12th IEEE International Conference on Solid-State and Integrated …, 2014
42014
Hardware-based protection for data security at run-time on embedded systems
X Wang, X Zhang, W Wang, P Du, Z Zhang, Y Tian, Q Hao, B Xu
IOP Conference Series: Materials Science and Engineering 466 (1), 012070, 2018
32018
Hardware-assisted integrity monitor based on lightweight hash function
P Du, X Wang, W Wang, L Li, T Xia, H Li
IEICE Electronics Express 15 (10), 20180107-20180107, 2018
32018
Hardware-assisted system for program execution security of SoC
X Wang, SS Pang, WK Wang, ZM Zhao, C Zhou, ZH He, XC Wang, Y Xu
ITM Web of Conferences 7, 03006, 2016
32016
Optimization of elliptic curve cryptography resisting power attack scalar multiplication algorithm in security system on chip
X Wang, L Wang, Y Bai, Z He, T Wang, B Xu, H Zhang, X Wang, C Zhou, ...
2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 …, 2015
32015
Embedded system confidentiality protection by cryptographic engine implemented with composite field arithmetic
W Wang, X Wang, P Du, Y Tian, X Zhang, Q Hao, Z Zhang, B Xu
MATEC Web of Conferences 210, 02047, 2018
22018
A multi-level collaboration low-power design based on embedded system
X Wang, L Li, L Zhang, W Wang, R Zhang, Y Zhang, Q Shen
2015 28th IEEE International System-on-Chip Conference (SOCC), 186-190, 2015
22015
Hardware-Based Software Control Flow Integrity: Review on the State-of-the-Art Implementation Technology
S Li, W Wang, W Li, D Zhang
IEEE Access 11, 133255-133280, 2023
12023
Securing Embedded System from Code Reuse Attacks: A Lightweight Scheme with Hardware Assistance
Z An, W Wang, W Li, S Li, D Zhang
Micromachines 14 (8), 1525, 2023
12023
A Static CFG Extraction Scheme for RISC-V Runtime CFI
W Li, W Wang, S Li, Z An
2023 9th International Symposium on System Security, Safety, and Reliability …, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20