default search action
Xinmu Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c18]Abdulrahman Alaql, Xinmu Wang, Md. Moshiur Rahman, Swarup Bhunia:
SOMA: Security Evaluation of Obfuscation Methods via Attack Sequencing. ISQED 2021: 381-386 - 2020
- [j7]Maoyuan Qin, Xinmu Wang, Baolei Mao, Dejun Mu, Wei Hu:
A formal model for proving hardware timing properties and identifying timing channels. Integr. 72: 123-133 (2020) - [c17]Xinmu Wang, Hewu Li, Tianming Lan, Qian Wu:
Overlay Coded Multicast for Edge Caching in 5G-Satellite Integrated Networks. WCNC 2020: 1-7 - [c16]Xinmu Wang, Hewu Li, Wenbing Yao, Tianming Lan, Qian Wu:
Content Delivery for High-Speed Railway via Integrated Terrestrial-Satellite Networks. WCNC 2020: 1-6
2010 – 2019
- 2019
- [j6]Lixia Xie, Ying Ding, Hongyu Yang, Xinmu Wang:
Blockchain-Based Secure and Trustworthy Internet of Things in SDN-Enabled 5G-VANETs. IEEE Access 7: 56656-56666 (2019) - [j5]Maoyuan Qin, Wei Hu, Xinmu Wang, Dejun Mu, Baolei Mao:
Theorem proof based gate level information flow tracking for hardware security verification. Comput. Secur. 85: 225-239 (2019) - [c15]Wei Hu, Yixin Ma, Xinmu Wang, Xingxin Wang:
Leveraging Unspecified Functionality in Obfuscated Hardware for Trojan and Fault Attacks. AsianHOST 2019: 1-6 - [c14]Xinmu Wang, Hewu Li, Mingkai Tong, Kang Pan, Qian Wu:
Network Coded Cooperative Multicast in Integrated Terrestrial-Satellite Networks. ISCC 2019: 1-6 - [c13]Xinmu Wang, Hewu Li, Mingkai Tong, Wenbing Yao, Qian Wu:
Cooperative Network-Coded Multicast for Layered Content Delivery in D2D-Enhanced HetNets. ISCC 2019: 1-6 - [c12]Xinmu Wang, Hewu Li, Qian Wu:
Optimizing Adaptive Coding and Modulation for Satellite Network with ML-based CSI Prediction. WCNC 2019: 1-6 - 2018
- [c11]Wei Hu, Xinmu Wang, Dejun Mu:
Security Path Verification Through Joint Information Flow Analysis. APCCAS 2018: 415-418 - [c10]Wei Hu, Armaiti Ardeshiricham, Mustafa S. Gobulukoglu, Xinmu Wang, Ryan Kastner:
Property specific information flow analysis for hardware security verification. ICCAD 2018: 89 - [c9]Tamzidul Hoque, Xinmu Wang, Abhishek Basak, Robert Karam, Swarup Bhunia:
Hardware Trojan attacks in embedded memory. VTS 2018: 1-6 - 2017
- [j4]Tamzidul Hoque, Seetharam Narasimhan, Xinmu Wang, Sanchita Mal-Sarkar, Swarup Bhunia:
Golden-Free Hardware Trojan Detection with High Sensitivity Under Process Noise. J. Electron. Test. 33(1): 107-124 (2017) - 2015
- [j3]Xinmu Wang, Yu Zheng, Abhishek Basak, Swarup Bhunia:
IIPS: Infrastructure IP for Secure SoC Design. IEEE Trans. Computers 64(8): 2226-2238 (2015) - [j2]Yu Zheng, Xinmu Wang, Swarup Bhunia:
SACCI: Scan-Based Characterization Through Clock Phase Sweep for Counterfeit Chip Detection. IEEE Trans. Very Large Scale Integr. Syst. 23(5): 831-841 (2015) - 2013
- [c8]Xinmu Wang, Wen Yueh, Debapriya Basu Roy, Seetharam Narasimhan, Yu Zheng, Saibal Mukhopadhyay, Debdeep Mukhopadhyay, Swarup Bhunia:
Role of power grid in side channel attack and power-grid-aware secure design. DAC 2013: 78:1-78:9 - 2012
- [j1]Seetharam Narasimhan, Wen Yueh, Xinmu Wang, Saibal Mukhopadhyay, Swarup Bhunia:
Improving IC Security Against Trojan Attacks Through Integration of Security Monitors. IEEE Des. Test Comput. 29(5): 37-46 (2012) - [c7]Xinmu Wang, Tatini Mal-Sarkar, Aswin Raghav Krishna, Seetharam Narasimhan, Swarup Bhunia:
Software exploitable hardware Trojans in embedded processor. DFT 2012: 55-58 - [c6]Xinmu Wang, Seetharam Narasimhan, Aswin Raghav Krishna, Swarup Bhunia:
SCARE: Side-Channel Analysis Based Reverse Engineering for Post-Silicon Validation. VLSI Design 2012: 304-309 - 2011
- [c5]Aswin Raghav Krishna, Seetharam Narasimhan, Xinmu Wang, Swarup Bhunia:
MECCA: A Robust Low-Overhead PUF Using Embedded Memory Array. CHES 2011: 407-420 - [c4]Xinmu Wang, Seetharam Narasimhan, Aswin Raghav Krishna, Francis G. Wolff, Srihari Rajgopal, Te-Hao Lee, Mehran Mehregany, Swarup Bhunia:
High-temperature (>500°C) reconfigurable computing using silicon carbide NEMS switches. DATE 2011: 1065-1070 - [c3]Seetharam Narasimhan, Xinmu Wang, Dongdong Du, Rajat Subhra Chakraborty, Swarup Bhunia:
TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detection. HOST 2011: 71-74 - [c2]Xinmu Wang, Seetharam Narasimhan, Aswin Raghav Krishna, Tatini Mal-Sarkar, Swarup Bhunia:
Sequential hardware Trojan: Side-channel aware design and placement. ICCD 2011: 297-300 - [c1]Xinmu Wang, Seetharam Narasimhan, Somnath Paul, Swarup Bhunia:
NEMTronics: Symbiotic integration of nanoelectronic and nanomechanical devices for energy-efficient adaptive computing. NANOARCH 2011: 210-217
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint