Gang Qu
Citée par
Citée par
Handbook of sensor networks: compact wireless and wired sensing systems
M Ilyas, I Mahgoub
CRC press, 2004
Exposure in wireless ad-hoc sensor networks
S Meguerdichian, F Koushanfar, G Qu, M Potkonjak
Proceedings of the 7th annual international conference on Mobile computing …, 2001
Power optimization of variable-voltage core-based systems
I Hong, D Kirovski, G Qu, M Potkonjak, MB Srivastava
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 1999
Power Optimization of Variable Voltage Core-Based Systems
MS I. Hong, D. Kirovski, G. Qu, M. Potkonjak
ACM/IEEE Design Automation Conference Proceedings, 176-181, 1998
Introduction to hardware security and trust
M Tehranipoor, C Wang
Springer Science & Business Media, 2011
Minimal and maximal exposure path algorithms for wireless embedded sensor networks
G Veltri, Q Huang, G Qu, M Potkonjak
Proceedings of the 1st international conference on Embedded networked sensor …, 2003
Synthesis techniques for low-power hard real-time systems on variable voltage processors
I Hong, G Qu, M Potkonjak, MB Srivastavas
Proceedings 19th IEEE Real-Time Systems Symposium (Cat. No. 98CB36279), 178-187, 1998
Exposure in wireless sensor networks: Theory and practical solutions
S Megerian, F Koushanfar, G Qu, G Veltri, M Potkonjak
Wireless Networks 8 (5), 443-454, 2002
Analysis of watermarking techniques for graph coloring problem
G Qu, M Potkonjak
Proceedings of the 1998 IEEE/ACM international conference on Computer-aided …, 1998
Temperature-aware cooperative ring oscillator PUF
CE Yin, G Qu
2009 IEEE International Workshop on Hardware-Oriented Security and Trust, 36-42, 2009
Function-level power estimation methodology for microprocessors
G Qu, N Kawabe, K Usami, M Potkonjak
Proceedings of the 37th Annual Design Automation Conference, 810-813, 2000
Hardware metering
F Koushanfar, G Qu
Proceedings of the 38th annual design automation conference, 490-493, 2001
A PUF-FSM binding scheme for FPGA IP protection and pay-per-device licensing
J Zhang, Y Lin, Y Lyu, G Qu
IEEE Transactions on Information Forensics and Security 10 (6), 1137-1150, 2015
What is the limit of energy saving by dynamic voltage scaling?
G Qu
IEEE/ACM International Conference on Computer Aided Design. ICCAD 2001. IEEE …, 2001
Intellectual property protection in VLSI designs: theory and practice
G Qu, M Potkonjak
Springer Science & Business Media, 2007
A survey on recent advances in vehicular network security, trust, and privacy
Z Lu, G Qu, Z Liu
IEEE Transactions on Intelligent Transportation Systems 20 (2), 760-776, 2018
Global identification of peptidase specificity by multiplex substrate profiling
AJ O'donoghue, AA Eroy-Reveles, GM Knudsen, J Ingram, M Zhou, ...
Nature methods 9 (11), 1095-1100, 2012
Design space exploration for energy-efficient secure sensor network
L Yuan, G Qu
Proceedings IEEE International Conference on Application-Specific Systems …, 2002
LISA: Maximizing RO PUF's secret extraction
CED Yin, G Qu
2010 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2010
Analysis of energy reduction on dynamic voltage scaling-enabled systems
L Yuan, G Qu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2005
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20