Follow
Sheng Wei
Title
Cited by
Cited by
Year
Scalable hardware Trojan diagnosis
S Wei, M Potkonjak
IEEE Transactions on very large scale integration (VLSI) systems 20 (6 …, 2011
1372011
Low latency live video streaming over HTTP 2.0
S Wei, V Swaminathan
Proceedings of Network and Operating System Support on Digital Audio and …, 2014
1242014
Gate-level characterization: Foundations and hardware security applications
S Wei, S Meguerdichian, M Potkonjak
Design Automation Conference, 222-227, 2010
1122010
Differential public physically unclonable functions: architecture and applications
M Potkonjak, S Meguerdichian, A Nahapetian, S Wei
Proceedings of the 48th Design Automation Conference, 242-247, 2011
752011
Malicious circuitry detection using thermal conditioning
S Wei, S Meguerdichian, M Potkonjak
IEEE Transactions on Information Forensics and Security 6 (3), 1136-1145, 2011
692011
Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry
S Wei, K Li, F Koushanfar, M Potkonjak
Proceedings of the 49th Annual Design Automation Conference, 90-95, 2012
652012
Low latency live video streaming using HTTP chunked encoding
V Swaminathan, S Wei
2011 IEEE 13th International Workshop on Multimedia Signal Processing, 1-6, 2011
602011
Provably complete hardware trojan detection using test point insertion
S Wei, K Li, F Koushanfar, M Potkonjak
2012 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 569-576, 2012
432012
Scalable segmentation-based malicious circuitry detection and diagnosis
S Wei, M Potkonjak
2010 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 483-486, 2010
432010
Cost effective video streaming using server push over HTTP 2.0
S Wei, V Swaminathan
2014 IEEE 16th International Workshop on Multimedia Signal Processing (MMSP …, 2014
402014
Power efficient mobile video streaming using HTTP/2 server push
S Wei, V Swaminathan, M Xiao
2015 IEEE 17th International Workshop on Multimedia Signal Processing (MMSP …, 2015
382015
The undetectable and unprovable hardware trojan horse
S Wei, M Potkonjak
2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC), 1-2, 2013
372013
PrinTracker: Fingerprinting 3D printers using commodity scanners
Z Li, AS Rathore, C Song, S Wei, Y Wang, W Xu
Proceedings of the 2018 ACM sigsac conference on computer and communications …, 2018
352018
Robust passive hardware metering
S Wei, A Nahapetian, M Potkonjak
Proceedings of the International Conference on Computer-Aided Design, 802-809, 2011
352011
Scalable consistency-based hardware Trojan detection and diagnosis
S Wei, M Potkonjak
2011 5th International Conference on Network and System Security, 176-183, 2011
352011
Dash2m: Exploring http/2 for internet streaming to mobile devices
M Xiao, V Swaminathan, S Wei, S Chen
Proceedings of the 24th ACM international conference on Multimedia, 22-31, 2016
332016
Self-consistency and consistency-based detection and diagnosis of malicious circuitry
S Wei, M Potkonjak
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 22 (9 …, 2013
312013
Power evaluation of 360 VR video streaming on head mounted display devices
N Jiang, V Swaminathan, S Wei
Proceedings of the 27th Workshop on Network and Operating Systems Support …, 2017
292017
Viewport prediction for live 360-degree mobile video streaming using user-content hybrid motion tracking
X Feng, V Swaminathan, S Wei
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2019
282019
Evaluating and improving push based video streaming with HTTP/2
M Xiao, V Swaminathan, S Wei, S Chen
Proceedings of the 26th International Workshop on Network and Operating …, 2016
272016
The system can't perform the operation now. Try again later.
Articles 1–20