


default search action
Wei Jiang 0016
Person information
- affiliation: University of Electronic Science and Technology of China, School of Information and Software, Chengdu, China
Other persons with the same name
- Wei Jiang — disambiguation page
- Wei Jiang 0001
— Eastman Kodak Company, Rochester, NY, USA (and 1 more)
- Wei Jiang 0002
— German Research Center for Artificial Intelligence (DFKI), Kaiserslautern, Germany (and 2 more)
- Wei Jiang 0003
— Peking University, School of Electronics Engineering and Computer Scinece, Beijing, China
- Wei Jiang 0004
— Chinese Academy of Sciences, Institute of Remote Sensing and Digital Earth, Beijing, China
- Wei Jiang 0005
— Huazhong University of Science and Technology, School of Environmental Science and Engineering, Wuhan, China
- Wei Jiang 0006
— National University of Defense Technology, College of Mechatronics Engineering and Automation, Changsha, China
- Wei Jiang 0007
— Liaoning Normal University, School of Mathematics, Dalian, China (and 1 more)
- Wei Jiang 0008
— Wuhan University, School of Mathematics and Statistics, China (and 1 more)
- Wei Jiang 0009
— Zhejiang University, Institute of Cyber-Systems and Control, Hangzhou, China (and 1 more)
- Wei Jiang 0010
— Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China
- Wei Jiang 0011
— Southeast University, School of Electrical Engineering, Nanjing, China
- Wei Jiang 0012
— Harbin Institute of Technology at Weihai, Department of Mathematics, China
- Wei Jiang 0013
— Anhui University, School of Mathematical Sciences, Hefei, China
- Wei Jiang 0014
— Aalto University, Finland (and 1 more)
- Wei Jiang 0015 — University of Waterloo, Ontario, Canada
- Wei Jiang 0017
— University of South Carolina, Department of Electrical Engineering, Columbia, SC, USA
- Wei Jiang 0018
— Beijing Jiaotong University, School of Electronic and Information Engineering, State Key Laboratory of Rail Traffic Control and Safety / Beijing Engineering Research Center of EMC and GNSS Technology for Rail Transportation, China (and 1 more)
- Wei Jiang 0019
— Yale University, New Haven, CT, USA (and 1 more)
- Wei Jiang 0020
— University of Electronic Science and Technology of China, National Key Laboratory of Science and Technology on Communications, Chengdu, China
- Wei Jiang 0021
— University of Florida, School of Forest Resources and Conservation, Gainesville, FL, USA
- Wei Jiang 0022
— Changzhou University, School of Information Science and Engineering, China
- Wei Jiang 0023
— Nanjing University of Aeronautics and Astronautics, Department of Biomedical Engineering, China (and 1 more)
- Wei Jiang 0024
— University of Illinois Urbana-Champaign (UIUC), Urbana, IL, USA
- Wei Jiang 0025
— Yangzhou University, Department of Electrical Engineering, Chine (and 2 more)
- Wei Jiang 0026
— Oracle Labs, Belmont, CA, USA (and 3 more)
- Wei Jiang 0027
— Alibaba Group, Hangzhou, China (and 1 more)
- Wei Jiang 0028 — Chinese Academy of Sciences, Institute of Computing Technology, Beijing, China
- Wei Jiang 0029 — Nanjing University, National Key Laboratory for Novel Software Technology, Nanjing, China
- Wei Jiang 0030 — Chinese Academy of Sciences, Institute of Automation, National Laboratory of Pattern Recognition, Beijing, China
- Wei Jiang 0031
— Peking University, Shenzhen Graduate School, School of Electronic and Computer Engineering, Guangdong Provincial Key Laboratory of Ultra High Definition Immersive Media Technology, Shenzhen, China
- Wei Jiang 0032
— Huazhong University of Science and Technology, School of Mechanical Science and Engineering, State Key Laboratory of Digital Manufacturing Equipment and Technology, Wuhan, China
- Wei Jiang 0033
— Wuhan Textile University, School of Mechanical Engineering and Automation, Hubei Key Laboratory of Digital Textile Equipment, Wuhan, China (and 1 more)
- Wei Jiang 0034 — University of British Columbia, Computer Vision Lab, Vancouver, Canada (and 1 more)
- Wei Jiang 0035 — University of California, Department of Computer Science, Los Angeles, CA, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j46]Jinyu Zhan
, Shiyu Zou, Wei Jiang
, Youyuan Zhang, Suidi Peng, Ying Wang
:
Accelerate Point Cloud Structuring for Deep Neural Networks via Fast Spatial-Searching Tree. IEEE Trans. Circuits Syst. Video Technol. 35(3): 2570-2585 (2025) - 2024
- [j45]Deepak Adhikari
, Wei Jiang, Jinyu Zhan, Danda B. Rawat
, Asmita Bhattarai:
Recent advances in anomaly detection in Internet of Things: Status, challenges, and perspectives. Comput. Sci. Rev. 54: 100665 (2024) - [j44]Xiangyu Wen
, Yu Li
, Wei Jiang
, Qiang Xu
:
On Function-Coupled Watermarks for Deep Neural Networks. IEEE J. Emerg. Sel. Topics Circuits Syst. 14(4): 608-619 (2024) - [j43]Deepak Adhikari
, Wei Jiang
, Jinyu Zhan
, Maregu Assefa
, Hadi Akbarzade Khorshidi
, Uwe Aickelin
, Danda B. Rawat
:
A Lightweight-Window-Portion-Based Multiple Imputation for Extreme Missing Gaps in IoT Systems. IEEE Internet Things J. 11(3): 3676-3689 (2024) - [j42]Lingxin Jin
, Wei Jiang
, Jinyu Zhan
, Xiangyu Wen
:
Highly Evasive Targeted Bit-Trojan on Deep Neural Networks. IEEE Trans. Computers 73(9): 2350-2363 (2024) - [j41]Jiankang Ren
, Chunxiao Liu
, Chi Lin
, Wei Jiang
, Pengfei Wang
, Xiangwei Qi
, Simeng Li
, Shengyu Li
:
Multimode Security-Aware Real-Time Scheduling on Multiprocessors. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(11): 3407-3418 (2024) - [j40]Jinyu Zhan
, Suidi Peng, Wei Jiang
, Xiang Wang, Jiarui Liu:
Detecting Spoofed Noisy Speeches via Activation-Based Residual Blocks for Embedded Systems. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(11): 3985-3996 (2024) - [j39]Jinyu Zhan
, Wei Jiang
, Xinke Liao, Ke Jiang
, Deepak Adhikari
:
Improving Dependability of Distributed Real-Time Applications via Safety and Security Co-Design. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(12): 4505-4518 (2024) - [j38]Maregu Assefa
, Wei Jiang
, Jinyu Zhan
, Kumie Gedamu
, Getinet Yilma
, Melese Ayalew
, Deepak Adhikari
:
Audio-Visual Contrastive and Consistency Learning for Semi-Supervised Action Recognition. IEEE Trans. Multim. 26: 3491-3504 (2024) - [j37]Wei Jiang
, Xiangyu Wen
, Jinyu Zhan
, Xupeng Wang
, Ziwei Song
, Chen Bian
:
Critical Path-Based Backdoor Detection for Deep Neural Networks. IEEE Trans. Neural Networks Learn. Syst. 35(3): 4032-4046 (2024) - [i4]Lingxin Jin, Xianyu Wen, Wei Jiang, Jinyu Zhan:
A Survey of Trojan Attacks and Defenses to Deep Neural Networks. CoRR abs/2408.08920 (2024) - [i3]Lingxin Jin, Meiyu Lin, Wei Jiang, Jinyu Zhan:
Data Poisoning-based Backdoor Attack Framework against Supervised Learning Rules of Spiking Neural Networks. CoRR abs/2409.15670 (2024) - 2023
- [j36]Deepak Adhikari
, Wei Jiang
, Jinyu Zhan, Zhiyuan He, Danda B. Rawat, Uwe Aickelin
, Hadi Akbarzade Khorshidi:
A Comprehensive Survey on Imputation of Missing Data in Internet of Things. ACM Comput. Surv. 55(7): 133:1-133:38 (2023) - [j35]Yongjia Yang
, Jinyu Zhan, Wei Jiang, Yucheng Jiang, Antai Yu:
Neural architecture search for resource constrained hardware devices: A survey. IET Cyper-Phys. Syst.: Theory & Appl. 8(3): 149-159 (2023) - [j34]Hong Lei
, Wei Jiang
, Jinyu Zhan, Shen You, Lingxin Jin, Xiaona Xie, Zhengwei Chang:
Iterative Training Attack: A Black-Box Adversarial Attack via Perturbation Generative Network. J. Circuits Syst. Comput. 32(18): 2350314:1-2350314:20 (2023) - [j33]Wei Jiang
, Xinke Liao, Jinyu Zhan
, Deepak Adhikari
, Ke Jiang:
DESCO: Decomposition-Based Co-Design to Improve Fault Tolerance of Security-Critical Tasks in Cyber Physical Systems. IEEE Trans. Computers 72(6): 1652-1665 (2023) - [j32]Maregu Assefa
, Wei Jiang
, Kumie Alemu Gedamu
, Getinet Yilma
, Deepak Adhikari, Melese Ayalew
, Abegaz Mohammed Seid
, Aiman Erbad
:
Actor-Aware Self-Supervised Learning for Semi-Supervised Video Representation Learning. IEEE Trans. Circuits Syst. Video Technol. 33(11): 6679-6692 (2023) - [j31]Wei Jiang
, Shen You
, Jinyu Zhan
, Xupeng Wang
, Hong Lei, Deepak Adhikari
:
Query-Efficient Generation of Adversarial Examples for Defensive DNNs via Multiobjective Optimization. IEEE Trans. Evol. Comput. 27(4): 832-847 (2023) - [j30]Maregu Assefa
, Wei Jiang
, Kumie Gedamu
, Getinet Yilma
, Bulbula Kumeda
, Melese Ayalew
:
Self-Supervised Scene-Debiasing for Video Representation Learning via Background Patching. IEEE Trans. Multim. 25: 5500-5515 (2023) - [j29]Jinyu Zhan
, Yongjia Yang, Wei Jiang
, Ke Jiang, Zhiguo Shi
, Cheng Zhuo
:
Fast Multi-Lane Detection Based on CNN Differentiation for ADAS/AD. IEEE Trans. Veh. Technol. 72(12): 15290-15300 (2023) - [i2]Xiangyu Wen
, Yu Li, Wei Jiang, Qiang Xu:
On Function-Coupled Watermarks for Deep Neural Networks. CoRR abs/2302.10296 (2023) - 2022
- [j28]Jinyu Zhan
, Wei Jiang, Ying Li, Junting Wu, Jianping Zhu, Jinghuan Yu
:
NIC-QF: A design of FPGA based Network Interface Card with Query Filter for big data systems. Future Gener. Comput. Syst. 136: 153-169 (2022) - [j27]Maregu Assefa
, Wei Jiang, Getinet Yilma
, Bulbula Kumeda, Melese Ayalew
, Mohammed Seid:
Self-Supervised Multi-Label Transformation Prediction for Video Representation Learning. J. Circuits Syst. Comput. 31(9): 2250159:1-2250159:20 (2022) - [j26]Jinyu Zhan
, Wei Jiang
, Ying Li, Junting Wu, Jianping Zhu, Jinghuan Yu
:
Accelerating Queries of Big Data Systems by Storage-Side CPU-FPGA Co-Design. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(7): 2128-2141 (2022) - [j25]Wei Jiang
, Xiangyu Wen
, Jinyu Zhan
, Xupeng Wang, Ziwei Song
:
Interpretability-Guided Defense Against Backdoor Attacks to Deep Neural Networks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(8): 2611-2624 (2022) - [j24]Jinyu Zhan
, Ruoxu Sun, Wei Jiang
, Yucheng Jiang, Xunzhao Yin
, Cheng Zhuo
:
Improving Fault Tolerance for Reliable DNN Using Boundary-Aware Activation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(10): 3414-3425 (2022) - [j23]Jinyu Zhan
, Zhibei Pu, Wei Jiang
, Junting Wu, Yongjia Yang:
Detecting Spoofed Speeches via Segment-Based Word CQCC and Average ZCR for Embedded Systems. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(11): 3862-3873 (2022) - [j22]Wei Jiang
, Ziwei Song
, Jinyu Zhan
, Di Liu
, Jiafu Wan
:
Layerwise Security Protection for Deep Neural Networks in Industrial Cyber Physical Systems. IEEE Trans. Ind. Informatics 18(12): 8797-8806 (2022) - [c40]Maregu Assefa
, Wei Jiang, Kumie Gedamu, Getinet Yilma
, Melese Ayalew, Mohammed Seid:
Actor-Aware Contrastive Learning for Semi-Supervised Action Recognition. ICTAI 2022: 660-665 - 2021
- [j21]Ruoxu Sun, Jinyu Zhan
, Wei Jiang, Qi Dong, Yalan Ye
:
Energy Optimization of Mixed-Criticality Distributed Real-Time Embedded Systems. J. Circuits Syst. Comput. 30(5): 2150085:1-2150085:19 (2021) - [j20]Kaiyan Chang
, Wei Jiang, Jinyu Zhan, Zicheng Gong, Weijia Pan:
ArchNet: A data hiding design for distributed machine learning systems. J. Syst. Archit. 114: 101912 (2021) - [j19]Wei Jiang, Yuhanxiao Ma, Ruiqi Chen
:
Gutter oil detection for food safety based on multi-feature machine learning and implementation on FPGA with approximate multipliers. PeerJ Comput. Sci. 7: e774 (2021) - [j18]Jinyu Zhan
, Xingzhi Zhou
, Wei Jiang
:
Field programmable gate array-based all-layer accelerator with quantization neural networks for sustainable cyber-physical systems. Softw. Pract. Exp. 51(11): 2203-2224 (2021) - [j17]Wei Jiang
, Zhiyuan He
, Jinyu Zhan
, Weijia Pan:
Attack-Aware Detection and Defense to Resist Adversarial Examples. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(10): 2194-2198 (2021) - [j16]Wei Jiang, Zhiyuan He
, Jinyu Zhan, Weijia Pan, Deepak Adhikari
:
Research Progress and Challenges on Application-Driven Adversarial Examples: A Survey. ACM Trans. Cyber Phys. Syst. 5(4): 39:1-39:25 (2021) - [c39]Xingzhi Zhou
, Jinyu Zhan, Wei Jiang:
Achieving fast lane detection of autonomous driving by CNN based differentiation: work-in-progress. CODES+ISSS 2021: 21-22 - [c38]Chen Bian, Wei Jiang, Jinyu Zhan, Ziwei Song, Xiangyu Wen
, Hong Lei:
A physically realizable backdoor attack on 3D point cloud deep learning: work-in-progress. CODES+ISSS 2021: 27-28 - [c37]Ziwei Song, Wei Jiang, Jinyu Zhan, Xiangyu Wen
, Chen Bian:
Critical-weight based locking scheme for DNN IP protection in edge computing: work-in-progress. CODES+ISSS 2021: 33-34 - [c36]Xiangyu Wen
, Wei Jiang, Jinyu Zhan, Chen Bian, Ziwei Song:
Generative strategy based backdoor attacks to 3D point clouds: work-in-progress. EMSOFT 2021: 23-24 - [c35]Zhufeng Fan, Jinyu Zhan, Wei Jiang:
Detecting deepfake videos by visual-audio synchronism: work-in-progress. EMSOFT 2021: 31-32 - [c34]Ruoxu Sun, Jinyu Zhan, Wei Jiang, Yucheng Jiang:
Improving fault tolerance of DNNs through weight remapping based on gaussian distribution: work-in-progress. EMSOFT 2021: 33-34 - [c33]Wei Jiang, Xinke Liao, Jinyu Zhan, Ke Jiang:
Work-in-Progress: Improving Resilience of Distributed Real-Time Applications via Security and Fault Tolerance Co-Design. RTSS 2021: 536-539 - 2020
- [j15]Wei Jiang
, Zicheng Gong, Jinyu Zhan, Zhiyuan He
, Weijia Pan:
A Low-Cost Image Encryption Method to Prevent Model Stealing of Deep Neural Network. J. Circuits Syst. Comput. 29(16): 2050252:1-2050252:20 (2020) - [j14]Wei Jiang, Liang Wen, Jinyu Zhan, Ke Jiang:
Design optimization of confidentiality-critical cyber physical systems with fault detection. J. Syst. Archit. 107: 101739 (2020) - [j13]Jinyu Zhan, Yixin Li, Wei Jiang, Jiayu Yu, Jinghuan Yu
:
Branch-aware data variable allocation for energy optimization of hybrid SRAM+NVM SPM☆. J. Syst. Archit. 109: 101797 (2020) - [j12]Wei Jiang, Ziwei Song
, Jinyu Zhan, Zhiyuan He
, Xiangyu Wen
, Ke Jiang:
Optimized co-scheduling of mixed-precision neural network accelerator for real-time multitasking applications. J. Syst. Archit. 110: 101775 (2020) - [c32]Ying Li, Jinyu Zhan, Wei Jiang, Junting Wu, Jianping Zhu:
An FPGA based Network Interface Card with Query Filter for Storage Nodes of Big Data Systems. ASP-DAC 2020: 556-561 - [c31]Jinyu Zhan, Junting Wu, Wei Jiang, Ying Li, Jianping Zhu:
Accelerating Queries of MongoDB by an FPGA-based Storage Engine: Work-in-Progress. CODES+ISSS 2020: 16-17 - [c30]Zicheng Gong, Wei Jiang, Jinyu Zhan, Ziwei Song
:
Model Stealing Defense with Hybrid Fuzzy Models: Work-in-Progress. CODES+ISSS 2020: 30-31 - [c29]Zhiyuan He, Wei Jiang, Jinyu Zhan, Xupeng Wang, Xiangyu Wen
:
Heatmap-Aware Low-Cost Design to Resist Adversarial Attacks: Work-in-Progress. CODES+ISSS 2020: 32-33 - [c28]Xiangyu Wen
, Wei Jiang, Jinyu Zhan, Xupeng Wang, Zhiyuan He:
Interpretability Derived Backdoor Attacks Detection in Deep Neural Networks: Work-in-Progress. EMSOFT 2020: 13-14 - [c27]Ruoxu Sun, Jinyu Zhan, Wei Jiang:
An Insight into Fault Propagation in Deep Neural Networks: Work-in-Progress. EMSOFT 2020: 20-21 - [c26]Jinyu Zhan, Ying Li, Wei Jiang, Jianping Zhu:
FPGA Based Co-design of Storage-side Query Filter for Big Data Systems. SoCC 2020: 25-30 - [i1]Kaiyan Chang, Wei Jiang, Zicheng Gong, Xiangyu Wen, Zhiyuan He, Weijia Pan:
ArchNet: Data Hiding Model in Distributed Machine Learning System. CoRR abs/2004.10968 (2020)
2010 – 2019
- 2019
- [j11]Jinyu Zhan, Junhuan Yang, Wei Jiang, Yufang Sun, Yixin Li:
Vehicle data management with specific wear-levelling and fault tolerance for hybrid DRAM-NVM memory. J. Syst. Archit. 98: 259-270 (2019) - [j10]Wei Jiang
, Xiong Pan, Ke Jiang, Liang Wen, Qi Dong:
Energy-Aware Design of Stochastic Applications With Statistical Deadline and Reliability Guarantees. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 38(8): 1413-1426 (2019) - [c25]Jinyu Zhan, Ying Li, Wei Jiang, Junting Wu, Jianping Zhu:
An improved network interface card with query filter for big data systems: work-in-progress. CODES+ISSS 2019: 19:1-19:2 - [c24]Yixin Li, Jinyu Zhan, Wei Jiang, Jiayu Yu:
Energy optimization of branch-aware data variable allocation on hybrid SRAM+NVM SPM for CPS. SAC 2019: 236-241 - 2018
- [j9]Jinyu Zhan, Xia Zhang, Wei Jiang, Yue Ma, Ke Jiang:
Energy optimization of security-sensitive mixed-criticality applications for distributed real-time systems. J. Parallel Distributed Comput. 117: 115-126 (2018) - [j8]Jinyu Zhan, Yiming Zhang
, Wei Jiang, Junhuan Yang, Lin Li, Yixin Li:
Energy-aware page replacement and consistency guarantee for hybrid NVM-DRAM memory systems. J. Syst. Archit. 89: 60-72 (2018) - [c23]Junlong Wang, Wei Jiang, Jinyu Zhan, Jinghuan Yu, Haibo Hu, Liugen Xu:
Persistence improvement for distributed cache with NVM based storage system: work-in-progress. CASES 2018: 2:1-2:3 - [c22]Yixin Li, Jinyu Zhan, Wei Jiang, Ying Li:
Writing-aware data variable allocation on hybrid SRAM+NVM SPM: work-in-progress. CASES 2018: 11:1-11:2 - [c21]Jinyu Zhan, Junhuan Yang, Wei Jiang, Yixin Li:
Dynamic data management for automotive ECUs with hybrid RAM-NVM memory: work-in-progress. CODES+ISSS 2018: 5 - [c20]Wei Jiang, Liugen Xiu, Jinyu Zhan, Ke Jiang:
Co-design of security-critical real-time systems to prevent fault injection attacks: work-in-progress. CODES+ISSS 2018: 9 - [c19]Wei Jiang, Haibo Hu, Jinyu Zhan, Ke Jiang:
Design of security-critical distributed real-time applications with fault-tolerant constraint: work-in-progress. EMSOFT 2018: 4 - 2017
- [j7]Wei Jiang, Xia Zhang, Jinyu Zhan, Yue Ma, Ke Jiang:
Design optimization of secure message communication for energy-constrained distributed real-time systems. J. Parallel Distributed Comput. 100: 1-15 (2017) - [j6]Wei Jiang, Paul Pop
, Ke Jiang:
Design optimization for security- and safety-critical distributed real-time applications. Microprocess. Microsystems 52: 401-415 (2017) - [c18]Lin Li, Wei Jiang, Rui Pan, Jinyu Zhan, Zili Shao, Xiankui Xiong:
On-line memorry defragmentation for NVM-based persistent heaps. NVMSA 2017: 1-4 - [c17]Yiming Zhang
, Jinyu Zhan, Junhuan Yang, Wei Jiang, Lin Li, Yixin Li:
Energy-aware page replacement for NVM based hybrid main memory system. RTCSA 2017: 1-6 - 2016
- [j5]Wei Jiang, Liang Wen, Ke Jiang, Xia Zhang, Xiong Pan, Keran Zhou:
System-Level Design to Detect Fault Injection Attacks on Embedded Real-Time Applications. ACM J. Emerg. Technol. Comput. Syst. 13(2): 22:1-22:18 (2016) - [c16]Xiong Pan, Wei Jiang, Ke Jiang, Liang Wen, Qi Dong:
Energy optimization of stochastic applications with statistical guarantees of deadline and reliability. ASP-DAC 2016: 324-329 - [c15]Li Zhu, Jinyu Zhan, Sihao Chen, Yiming Zhang
, Junhuan Yang, Wei Jiang, Lin Li:
Fault Tolerant Algorithm for NVM to Reuse the Error Blocks. ICESS 2016: 54-59 - [c14]Junhuan Yang, Jinyu Zhan, Yiming Zhang
, Wei Jiang, Lin Li, Li Zhu, Xuefei Tang:
Data Management for Automotive ECUs Based on Hybrid RAM-NVM Main Memory. ICESS 2016: 74-79 - [c13]Yiming Zhang
, Jinyu Zhan, Junhuan Yang, Wei Jiang, Lin Li, Li Zhu, Xuefei Tang:
Dynamic Memory Management for Hybrid DRAM-NVM Main Memory Systems. ICESS 2016: 148-153 - 2015
- [j4]Wei Jiang, Yue Ma, Nan Sang, Ziguo Zhong:
Dynamic security management for real-time embedded applications in industrial networks. Comput. Electr. Eng. 41: 86-101 (2015) - [j3]Wei Jiang, Yue Ma, Xia Zhang, Xupeng Wang
, Zili Shao
:
Adaptive security management of real-time storage applications over NAND based storage systems. J. Netw. Comput. Appl. 52: 139-153 (2015) - [j2]Wei Jiang, Ke Jiang, Xia Zhang, Yue Ma:
Energy Optimization of Security-Critical Real-Time Applications with Guaranteed Security Protection. J. Syst. Archit. 61(7): 282-292 (2015) - [c12]Liang Wen, Wei Jiang, Ke Jiang, Xia Zhang, Xiong Pan, Keran Zhou:
Detecting Fault Injection Attacks on Embedded Real-Time Applications: A System-Level Perspective. HPCC/CSS/ICESS 2015: 700-705 - 2014
- [c11]Wei Jiang, Ke Jiang, Xia Zhang, Yue Ma:
Energy aware real-time scheduling policy with guaranteed security protection. ASP-DAC 2014: 317-322 - 2013
- [j1]Wei Jiang, Zhenlin Guo, Yue Ma, Nan Sang:
Measurement-based research on cryptographic algorithms for embedded real-time systems. J. Syst. Archit. 59(10-D): 1394-1404 (2013) - [c10]Xia Zhang, Jinyu Zhan, Wei Jiang, Yue Ma, Ke Jiang:
Design Optimization of Energy- and Security-Critical Distributed Real-Time Embedded Systems. IPDPS Workshops 2013: 741-750 - [c9]Xia Zhang, Jinyu Zhan, Wei Jiang, Yue Ma:
A Vulnerability Optimization Method for Security-Critical Real-Time Systems. NAS 2013: 215-221 - [c8]Wei Jiang, Yue Ma, Xia Zhang, Xupeng Wang, Zili Shao
:
Online optimization of security-sensitive real-time storage applications for NAND flash memory storage systems. RTCSA 2013: 121-130 - [c7]Ke Jiang, Adrian Alin Lifa, Petru Eles, Zebo Peng, Wei Jiang:
Energy-aware design of secure multi-mode real-time embedded systems with FPGA co-processors. RTNS 2013: 109-118 - 2012
- [c6]Yue Ma, Wei Jiang, Nan Sang, Ziguo Zhong:
An Adaptive Risk Control and Security Management for Embedded Real-Time System. ARES 2012: 11-17 - [c5]Wei Jiang, Zhenlin Guo, Yue Ma, Nan Sang:
Research on Cryptographic Algorithms for Embedded Real-time Systems: A Perspective of Measurement-based Analysis. HPCC-ICESS 2012: 1495-1501 - [c4]Yue Ma, Wei Jiang, Nan Sang, Xia Zhang:
ARCSM: A Distributed Feedback Control Mechanism for Security-critical Real-time System. ISPA 2012: 379-386 - [c3]Wei Jiang, Ke Jiang, Yue Ma:
Resource Allocation of Security-Critical Tasks with Statistically Guaranteed Energy Constraint. RTCSA 2012: 330-339 - [c2]Yue Ma, Wei Jiang, Nan Sang, Paul Pop
:
SAFCM: A Security-Aware Feedback Control Mechanism for Distributed Real-Time Embedded Systems. RTCSA 2012: 340-349 - 2011
- [c1]Zhenlin Guo, Wei Jiang, Nan Sang, Yue Ma:
Energy Measurement and Analysis of Security Algorithms for Embedded Systems. GreenCom 2011: 194-199
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-26 23:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint