Gang Qu
Cited by
Cited by
Exposure in wireless ad-hoc sensor networks
S Meguerdichian, F Koushanfar, G Qu, M Potkonjak
Proceedings of the 7th annual international conference on Mobile computing …, 2001
A survey on recent advances in vehicular network security, trust, and privacy
Z Lu, G Qu, Z Liu
IEEE Transactions on Intelligent Transportation Systems 20 (2), 760-776, 2018
Introduction to hardware security and trust
M Tehranipoor, C Wang
Springer Science & Business Media, 2011
Power Optimization of Variable Voltage Core-Based Systems
MS I. Hong, D. Kirovski, G. Qu, M. Potkonjak
ACM/IEEE Design Automation Conference Proceedings, 176-181, 1998
A privacy-preserving trust model based on blockchain for VANETs
Z Lu, W Liu, Q Wang, G Qu, Z Liu
Ieee Access 6, 45655-45664, 2018
Minimal and maximal exposure path algorithms for wireless embedded sensor networks
G Veltri, Q Huang, G Qu, M Potkonjak
Proceedings of the 1st international conference on Embedded networked sensor …, 2003
BARS: A blockchain-based anonymous reputation system for trust management in VANETs
Z Lu, Q Wang, G Qu, Z Liu
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
Exposure in wireless sensor networks: Theory and practical solutions
S Megerian, F Koushanfar, G Qu, G Veltri, M Potkonjak
Wireless Networks 8, 443-454, 2002
Synthesis techniques for low-power hard real-time systems on variable voltage processors
I Hong, G Qu, M Potkonjak, MB Srivastavas
Proceedings 19th IEEE Real-Time Systems Symposium (Cat. No. 98CB36279), 178-187, 1998
AoI-minimal trajectory planning and data collection in UAV-assisted wireless powered IoT networks
H Hu, K Xiong, G Qu, Q Ni, P Fan, KB Letaief
IEEE Internet of Things Journal 8 (2), 1211-1223, 2020
Temperature-aware cooperative ring oscillator PUF
CE Yin, G Qu
2009 IEEE International Workshop on Hardware-Oriented Security and Trust, 36-42, 2009
A blockchain-based privacy-preserving authentication scheme for VANETs
Z Lu, Q Wang, G Qu, H Zhang, Z Liu
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 27 (12 …, 2019
Global identification of peptidase specificity by multiplex substrate profiling
AJ O'donoghue, AA Eroy-Reveles, GM Knudsen, J Ingram, M Zhou, ...
Nature methods 9 (11), 1095-1100, 2012
A PUF-FSM binding scheme for FPGA IP protection and pay-per-device licensing
J Zhang, Y Lin, Y Lyu, G Qu
IEEE Transactions on Information Forensics and Security 10 (6), 1137-1150, 2015
Analysis of watermarking techniques for graph coloring problem
G Qu, M Potkonjak
Proceedings of the 1998 IEEE/ACM international conference on Computer-aided …, 1998
Hardware metering
F Koushanfar, G Qu
Proceedings of the 38th annual design automation conference, 490-493, 2001
A survey on silicon PUFs and recent advances in ring oscillator PUFs
JL Zhang, G Qu, YQ Lv, Q Zhou
Journal of computer science and technology 29 (4), 664-678, 2014
Voltjockey: Breaching trustzone by software-controlled voltage manipulation over multi-core frequencies
P Qiu, D Wang, Y Lyu, G Qu
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
LISA: Maximizing RO PUF's secret extraction
CED Yin, G Qu
2010 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2010
Effective iterative techniques for fingerprinting design IP
AE Caldwell, HJ Choi, AB Kahng, S Mantik, M Potkonjak, G Qu, JL Wong
Proceedings of the 36th annual ACM/IEEE Design Automation Conference, 843-848, 1999
The system can't perform the operation now. Try again later.
Articles 1–20