Gang Qu
Cited by
Cited by
Handbook of sensor networks: compact wireless and wired sensing systems
M Ilyas, I Mahgoub
CRC press, 2004
Exposure in wireless ad-hoc sensor networks
S Meguerdichian, F Koushanfar, G Qu, M Potkonjak
Proceedings of the 7th annual international conference on Mobile computing …, 2001
Power optimization of variable-voltage core-based systems
I Hong, D Kirovski, G Qu, M Potkonjak, MB Srivastava
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 1999
Power Optimization of Variable Voltage Core-Based Systems
MS I. Hong, D. Kirovski, G. Qu, M. Potkonjak
ACM/IEEE Design Automation Conference Proceedings, 176-181, 1998
Introduction to hardware security and trust
M Tehranipoor, C Wang
Springer Science & Business Media, 2011
Minimal and maximal exposure path algorithms for wireless embedded sensor networks
G Veltri, Q Huang, G Qu, M Potkonjak
Proceedings of the 1st international conference on Embedded networked sensor …, 2003
Synthesis techniques for low-power hard real-time systems on variable voltage processors
I Hong, G Qu, M Potkonjak, MB Srivastavas
Proceedings 19th IEEE Real-Time Systems Symposium (Cat. No. 98CB36279), 178-187, 1998
Exposure in wireless sensor networks: Theory and practical solutions
S Megerian, F Koushanfar, G Qu, G Veltri, M Potkonjak
Wireless Networks 8 (5), 443-454, 2002
A survey on recent advances in vehicular network security, trust, and privacy
Z Lu, G Qu, Z Liu
IEEE Transactions on Intelligent Transportation Systems 20 (2), 760-776, 2018
A privacy-preserving trust model based on blockchain for VANETs
Z Lu, W Liu, Q Wang, G Qu, Z Liu
IEEE Access 6, 45655-45664, 2018
Temperature-aware cooperative ring oscillator PUF
CE Yin, G Qu
2009 IEEE International Workshop on Hardware-Oriented Security and Trust, 36-42, 2009
Analysis of watermarking techniques for graph coloring problem
G Qu, M Potkonjak
Proceedings of the 1998 IEEE/ACM international conference on Computer-aided …, 1998
A PUF-FSM binding scheme for FPGA IP protection and pay-per-device licensing
J Zhang, Y Lin, Y Lyu, G Qu
IEEE Transactions on Information Forensics and Security 10 (6), 1137-1150, 2015
Hardware metering
F Koushanfar, G Qu
Proceedings of the 38th annual design automation conference, 490-493, 2001
Function-level power estimation methodology for microprocessors
G Qu, N Kawabe, K Usami, M Potkonjak
Proceedings of the 37th Annual Design Automation Conference, 810-813, 2000
Global identification of peptidase specificity by multiplex substrate profiling
AJ O'donoghue, AA Eroy-Reveles, GM Knudsen, J Ingram, M Zhou, ...
Nature methods 9 (11), 1095-1100, 2012
Effective iterative techniques for fingerprinting design IP
AE Caldwell, HJ Choi, AB Kahng, S Mantik, M Potkonjak, G Qu, JL Wong
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2004
What is the limit of energy saving by dynamic voltage scaling?
G Qu
IEEE/ACM International Conference on Computer Aided Design. ICCAD 2001. IEEE …, 2001
Bars: a blockchain-based anonymous reputation system for trust management in vanets
Z Lu, Q Wang, G Qu, Z Liu
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
LISA: Maximizing RO PUF's secret extraction
CED Yin, G Qu
2010 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2010
The system can't perform the operation now. Try again later.
Articles 1–20