متابعة
Qian Wang
Qian Wang
بريد إلكتروني تم التحقق منه على ucmerced.edu
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
A privacy-preserving trust model based on blockchain for VANETs
Z Lu, W Liu, Q Wang, G Qu, Z Liu
Ieee Access 6, 45655-45664, 2018
3882018
BARS: A blockchain-based anonymous reputation system for trust management in VANETs
Z Lu, Q Wang, G Qu, Z Liu
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
2962018
A blockchain-based privacy-preserving authentication scheme for VANETs
Z Lu, Q Wang, G Qu, H Zhang, Z Liu
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 27 (12 …, 2019
2252019
Approximate computing for low power and security in the internet of things
M Gao, Q Wang, MT Arafin, Y Lyu, G Qu
Computer 50 (6), 27-34, 2017
902017
An entropy analysis based intrusion detection system for controller area network in vehicles
Q Wang, Z Lu, G Qu
2018 31st IEEE International System-on-Chip Conference (SOCC), 90-95, 2018
692018
A machine learning attack resistant dual-mode PUF
Q Wang, M Gao, G Qu
Proceedings of the 2018 on Great Lakes Symposium on VLSI, 177-182, 2018
542018
LEAP: A lightweight encryption and authentication protocol for in-vehicle communications
Z Lu, Q Wang, X Chen, G Qu, Y Lyu, Z Liu
2019 IEEE Intelligent Transportation Systems Conference (ITSC), 1158-1164, 2019
512019
A delay based plug-in-monitor for intrusion detection in controller area network
Q Wang, Y Qian, Z Lu, Y Shoukry, G Qu
2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 86-91, 2018
252018
A novel data format for approximate arithmetic computing
M Gao, Q Wang, ASK Nagendra, G Qu
2017 22nd Asia and South Pacific design automation conference (ASP-DAC), 390-395, 2017
242017
A silicon PUF based entropy pump
Q Wang, G Qu
IEEE Transactions on Dependable and Secure Computing 16 (3), 402-414, 2018
232018
Method to mitigate timing based attacks on key agreement schemes over controller area network
S Jain, Q Wang, JG Merchan
US Patent 10,805,339, 2020
192020
Edge computing based GPS spoofing detection methods
Q Wang, Z Lu, M Gao, G Qu
2018 IEEE 23rd International Conference on Digital Signal Processing (DSP), 1-5, 2018
192018
Methods and arrangements for multi-layer in-vehicle network intrusion detection and characterization
CN Gutierrez, M Juliato, S Ahmed, Q Wang, M Sastry, LL Yang, X Liu
US Patent 11,423,145, 2022
162022
New methods of template attack based on fault sensitivity analysis
Q Wang, A Wang, G Qu, G Zhang
IEEE transactions on multi-scale computing systems 3 (2), 113-123, 2017
162017
Probing attacks on physical layer key agreement for automotive controller area networks
S Jain, Q Wang, MT Arafin, J Guajardo
2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 7-12, 2018
142018
Method to mitigate voltage based attacks on key agreement over controller area network (CAN)
S Jain, Q Wang, MT Arafin, JG Merchan
US Patent 10,958,680, 2021
132021
DoS attacks and countermeasures on network devices
Q Wang, T Dunlap, Y Cho, G Qu
2017 26th Wireless and Optical Communication Conference (WOCC), 1-6, 2017
112017
Mitigating adversarial attacks for deep neural networks by input deformation and augmentation
P Qiu, Q Wang, D Wang, Y Lyu, Z Lu, G Qu
2020 25th Asia and South Pacific design automation conference (ASP-DAC), 157-162, 2020
92020
Right or wrong collision rate analysis without profiling: full-automatic collision fault attack
A Wang, Y Zhang, W Tian, Q Wang, G Zhang, L Zhu
Science China Information Sciences 61, 1-11, 2018
72018
A new zero value attack combined fault sensitivity analysis on masked AES
Q Wang, A Wang, L Wu, J Zhang
Microprocessors and Microsystems 45, 355-362, 2016
72016
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20