Sheng Wei
Title
Cited by
Cited by
Year
Scalable hardware Trojan diagnosis
S Wei, M Potkonjak
IEEE Transactions on very large scale integration (VLSI) systems 20 (6 …, 2011
1272011
Low latency live video streaming over HTTP 2.0
S Wei, V Swaminathan
Proceedings of Network and Operating System Support on Digital Audio and …, 2014
1092014
Gate-level characterization: Foundations and hardware security applications
S Wei, S Meguerdichian, M Potkonjak
Design Automation Conference, 222-227, 2010
1082010
Differential public physically unclonable functions: architecture and applications
M Potkonjak, S Meguerdichian, A Nahapetian, S Wei
Proceedings of the 48th Design Automation Conference, 242-247, 2011
692011
Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry
S Wei, K Li, F Koushanfar, M Potkonjak
Proceedings of the 49th Annual Design Automation Conference, 90-95, 2012
632012
Malicious circuitry detection using thermal conditioning
S Wei, S Meguerdichian, M Potkonjak
IEEE Transactions on Information Forensics and Security 6 (3), 1136-1145, 2011
632011
Low latency live video streaming using HTTP chunked encoding
V Swaminathan, S Wei
2011 IEEE 13th International Workshop on Multimedia Signal Processing, 1-6, 2011
492011
Provably complete hardware trojan detection using test point insertion
S Wei, K Li, F Koushanfar, M Potkonjak
2012 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 569-576, 2012
442012
Scalable segmentation-based malicious circuitry detection and diagnosis
S Wei, M Potkonjak
2010 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 483-486, 2010
412010
Cost effective video streaming using server push over HTTP 2.0
S Wei, V Swaminathan
2014 IEEE 16th International Workshop on Multimedia Signal Processing (MMSP …, 2014
382014
The undetectable and unprovable hardware trojan horse
S Wei, M Potkonjak
2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC), 1-2, 2013
342013
Scalable consistency-based hardware Trojan detection and diagnosis
S Wei, M Potkonjak
2011 5th International Conference on Network and System Security, 176-183, 2011
342011
Power efficient mobile video streaming using HTTP/2 server push
S Wei, V Swaminathan, M Xiao
2015 IEEE 17th International Workshop on Multimedia Signal Processing (MMSP …, 2015
332015
Robust passive hardware metering
S Wei, A Nahapetian, M Potkonjak
Proceedings of the International Conference on Computer-Aided Design, 802-809, 2011
332011
Dash2m: Exploring http/2 for internet streaming to mobile devices
M Xiao, V Swaminathan, S Wei, S Chen
Proceedings of the 24th ACM international conference on Multimedia, 22-31, 2016
292016
Self-consistency and consistency-based detection and diagnosis of malicious circuitry
S Wei, M Potkonjak
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 22 (9 …, 2013
292013
Integrated circuit security techniques using variable supply voltage
S Wei, M Potkonjak
Proceedings of the 48th Design Automation Conference, 248-253, 2011
272011
Reverse engineering and prevention techniques for physical unclonable functions using side channels
S Wei, JB Wendt, A Nahapetian, M Potkonjak
Proceedings of the 51st Annual Design Automation Conference, 1-6, 2014
252014
Evaluating and improving push based video streaming with HTTP/2
M Xiao, V Swaminathan, S Wei, S Chen
Proceedings of the 26th International Workshop on Network and Operating …, 2016
242016
Gate characterization using singular value decomposition: Foundations and applications
S Wei, A Nahapetian, M Nelson, F Koushanfar, M Potkonjak
IEEE Transactions on Information Forensics and Security 7 (2), 765-773, 2011
242011
The system can't perform the operation now. Try again later.
Articles 1–20