Exposure in wireless ad-hoc sensor networks S Meguerdichian, F Koushanfar, G Qu, M Potkonjak Proceedings of the 7th annual international conference on Mobile computing …, 2001 | 900 | 2001 |
A survey on recent advances in vehicular network security, trust, and privacy Z Lu, G Qu, Z Liu IEEE Transactions on Intelligent Transportation Systems 20 (2), 760-776, 2018 | 636 | 2018 |
Introduction to hardware security and trust M Tehranipoor, C Wang Springer Science & Business Media, 2011 | 580 | 2011 |
Power Optimization of Variable Voltage Core-Based Systems MS I. Hong, D. Kirovski, G. Qu, M. Potkonjak ACM/IEEE Design Automation Conference Proceedings, 176-181, 1998 | 537* | 1998 |
A privacy-preserving trust model based on blockchain for VANETs Z Lu, W Liu, Q Wang, G Qu, Z Liu Ieee Access 6, 45655-45664, 2018 | 378 | 2018 |
Minimal and maximal exposure path algorithms for wireless embedded sensor networks G Veltri, Q Huang, G Qu, M Potkonjak Proceedings of the 1st international conference on Embedded networked sensor …, 2003 | 297 | 2003 |
BARS: A blockchain-based anonymous reputation system for trust management in VANETs Z Lu, Q Wang, G Qu, Z Liu 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 291 | 2018 |
Exposure in wireless sensor networks: Theory and practical solutions S Megerian, F Koushanfar, G Qu, G Veltri, M Potkonjak Wireless Networks 8, 443-454, 2002 | 281 | 2002 |
AoI-minimal trajectory planning and data collection in UAV-assisted wireless powered IoT networks H Hu, K Xiong, G Qu, Q Ni, P Fan, KB Letaief IEEE Internet of Things Journal 8 (2), 1211-1223, 2020 | 279 | 2020 |
Synthesis techniques for low-power hard real-time systems on variable voltage processors I Hong, G Qu, M Potkonjak, MB Srivastavas Proceedings 19th IEEE Real-Time Systems Symposium (Cat. No. 98CB36279), 178-187, 1998 | 271 | 1998 |
A blockchain-based privacy-preserving authentication scheme for VANETs Z Lu, Q Wang, G Qu, H Zhang, Z Liu IEEE Transactions on Very Large Scale Integration (VLSI) Systems 27 (12 …, 2019 | 209 | 2019 |
Temperature-aware cooperative ring oscillator PUF CE Yin, G Qu 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, 36-42, 2009 | 202 | 2009 |
Global identification of peptidase specificity by multiplex substrate profiling AJ O'donoghue, AA Eroy-Reveles, GM Knudsen, J Ingram, M Zhou, ... Nature methods 9 (11), 1095-1100, 2012 | 193 | 2012 |
A PUF-FSM binding scheme for FPGA IP protection and pay-per-device licensing J Zhang, Y Lin, Y Lyu, G Qu IEEE Transactions on Information Forensics and Security 10 (6), 1137-1150, 2015 | 187 | 2015 |
Analysis of watermarking techniques for graph coloring problem G Qu, M Potkonjak Proceedings of the 1998 IEEE/ACM international conference on Computer-aided …, 1998 | 181 | 1998 |
Hardware metering F Koushanfar, G Qu Proceedings of the 38th annual design automation conference, 490-493, 2001 | 168 | 2001 |
Voltjockey: Breaching trustzone by software-controlled voltage manipulation over multi-core frequencies P Qiu, D Wang, Y Lyu, G Qu Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 156 | 2019 |
A survey on silicon PUFs and recent advances in ring oscillator PUFs JL Zhang, G Qu, YQ Lv, Q Zhou Journal of computer science and technology 29 (4), 664-678, 2014 | 154 | 2014 |
LISA: Maximizing RO PUF's secret extraction CED Yin, G Qu 2010 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2010 | 153 | 2010 |
Effective iterative techniques for fingerprinting design IP AE Caldwell, HJ Choi, AB Kahng, S Mantik, M Potkonjak, G Qu, JL Wong Proceedings of the 36th annual ACM/IEEE Design Automation Conference, 843-848, 1999 | 148 | 1999 |