A privacy-preserving trust model based on blockchain for VANETs Z Lu, W Liu, Q Wang, G Qu, Z Liu Ieee Access 6, 45655-45664, 2018 | 365 | 2018 |
BARS: A blockchain-based anonymous reputation system for trust management in VANETs Z Lu, Q Wang, G Qu, Z Liu 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 286 | 2018 |
A blockchain-based privacy-preserving authentication scheme for VANETs Z Lu, Q Wang, G Qu, H Zhang, Z Liu IEEE Transactions on Very Large Scale Integration (VLSI) Systems 27 (12 …, 2019 | 194 | 2019 |
Approximate computing for low power and security in the internet of things M Gao, Q Wang, MT Arafin, Y Lyu, G Qu Computer 50 (6), 27-34, 2017 | 85 | 2017 |
An entropy analysis based intrusion detection system for controller area network in vehicles Q Wang, Z Lu, G Qu 2018 31st IEEE International System-on-Chip Conference (SOCC), 90-95, 2018 | 67 | 2018 |
LEAP: A lightweight encryption and authentication protocol for in-vehicle communications Z Lu, Q Wang, X Chen, G Qu, Y Lyu, Z Liu 2019 IEEE Intelligent Transportation Systems Conference (ITSC), 1158-1164, 2019 | 43 | 2019 |
A machine learning attack resistant dual-mode PUF Q Wang, M Gao, G Qu Proceedings of the 2018 on Great Lakes Symposium on VLSI, 177-182, 2018 | 42 | 2018 |
A novel data format for approximate arithmetic computing M Gao, Q Wang, ASK Nagendra, G Qu 2017 22nd Asia and South Pacific design automation conference (ASP-DAC), 390-395, 2017 | 23 | 2017 |
A delay based plug-in-monitor for intrusion detection in controller area network Q Wang, Y Qian, Z Lu, Y Shoukry, G Qu 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 86-91, 2018 | 22 | 2018 |
A silicon PUF based entropy pump Q Wang, G Qu IEEE Transactions on Dependable and Secure Computing 16 (3), 402-414, 2018 | 19 | 2018 |
Edge computing based GPS spoofing detection methods Q Wang, Z Lu, M Gao, G Qu 2018 IEEE 23rd International Conference on Digital Signal Processing (DSP), 1-5, 2018 | 17 | 2018 |
New methods of template attack based on fault sensitivity analysis Q Wang, A Wang, G Qu, G Zhang IEEE transactions on multi-scale computing systems 3 (2), 113-123, 2017 | 16 | 2017 |
Method to mitigate voltage based attacks on key agreement over controller area network (CAN) S Jain, Q Wang, MT Arafin, JG Merchan US Patent 10,958,680, 2021 | 12 | 2021 |
Probing attacks on physical layer key agreement for automotive controller area networks S Jain, Q Wang, MT Arafin, J Guajardo 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 7-12, 2018 | 11 | 2018 |
DoS attacks and countermeasures on network devices Q Wang, T Dunlap, Y Cho, G Qu 2017 26th Wireless and Optical Communication Conference (WOCC), 1-6, 2017 | 11 | 2017 |
Right or wrong collision rate analysis without profiling: full-automatic collision fault attack A Wang, Y Zhang, W Tian, Q Wang, G Zhang, L Zhu Science China Information Sciences 61, 1-11, 2018 | 7 | 2018 |
Mitigating adversarial attacks for deep neural networks by input deformation and augmentation P Qiu, Q Wang, D Wang, Y Lyu, Z Lu, G Qu 2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC), 157-162, 2020 | 6 | 2020 |
A new zero value attack combined fault sensitivity analysis on masked AES Q Wang, A Wang, L Wu, J Zhang Microprocessors and Microsystems 45, 355-362, 2016 | 6 | 2016 |
Efficient transfer learning on modeling physical unclonable functions Q Wang, O Aramoon, P Qiu, G Qu 2020 21st International Symposium on Quality Electronic Design (ISQED), 1-6, 2020 | 5 | 2020 |
PUF-PassSE: A PUF based password strength enhancer for IoT applications Q Wang, M Gao, G Qu 20th International Symposium on Quality Electronic Design (ISQED), 198-203, 2019 | 5 | 2019 |