Design optimization for security-and safety-critical distributed real-time applications W Jiang, P Pop, K Jiang Microprocessors and Microsystems 52, 401-415, 2017 | 66 | 2017 |
Design optimization of confidentiality-critical cyber physical systems with fault detection W Jiang, L Wen, J Zhan, K Jiang Journal of Systems Architecture 107, 101739, 2020 | 55 | 2020 |
A comprehensive survey on imputation of missing data in internet of things D Adhikari, W Jiang, J Zhan, Z He, DB Rawat, U Aickelin, HA Khorshidi ACM Computing Surveys 55 (7), 1-38, 2022 | 54 | 2022 |
Energy-aware design of stochastic applications with statistical deadline and reliability guarantees W Jiang, X Pan, K Jiang, L Wen, Q Dong IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2018 | 47 | 2018 |
Optimized co-scheduling of mixed-precision neural network accelerator for real-time multitasking applications W Jiang, Z Song, J Zhan, Z He, X Wen, K Jiang Journal of Systems Architecture 110, 101775, 2020 | 43 | 2020 |
Measurement-based research on cryptographic algorithms for embedded real-time systems W Jiang, Z Guo, Y Ma, N Sang Journal of Systems Architecture 59 (10), 1394-1404, 2013 | 32 | 2013 |
Improving fault tolerance for reliable DNN using boundary-aware activation J Zhan, R Sun, W Jiang, Y Jiang, X Yin, C Zhuo IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2021 | 27 | 2021 |
Energy optimization of security-critical real-time applications with guaranteed security protection W Jiang, K Jiang, X Zhang, Y Ma Journal of systems architecture 61 (7), 282-292, 2015 | 26 | 2015 |
面向高等教育的嵌入式系统教学改革 江维, 桑楠 计算机教育, 33-35, 2011 | 25 | 2011 |
Design optimization of security-sensitive mixed-criticality real-time embedded systems X Zhang, J Zhan, W Jiang, Y Ma, K Jiang 1st workshop on Real-Time Mixed Criticality Systems (ReTiMiCS), 2013 | 24 | 2013 |
Energy-saving service scheduling for low-end cyber-physical systems W Jiang, G Xiong, X Ding 2008 The 9th International Conference for Young Computer Scientists, 1064-1069, 2008 | 24 | 2008 |
Energy-aware page replacement and consistency guarantee for hybrid NVM–DRAM memory systems J Zhan, Y Zhang, W Jiang, J Yang, L Li, Y Li Journal of Systems Architecture 89, 60-72, 2018 | 23 | 2018 |
基于粒子滤波的移动物体定位和追踪算法 周帆, 江维, 李树全, 张玉宏, 曾雪, 吴跃 软件学报 24 (9), 2196-2213, 2013 | 23 | 2013 |
Periodic real-time message scheduling for confidentiality-aware cyber-physical system in wireless networks W Jiang, W Guo, N Sang 2010 Fifth International Conference on Frontier of Computer Science and …, 2010 | 22 | 2010 |
Interpretability-guided defense against backdoor attacks to deep neural networks W Jiang, X Wen, J Zhan, X Wang, Z Song IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2021 | 21 | 2021 |
Attack-aware detection and defense to resist adversarial examples W Jiang, Z He, J Zhan, W Pan IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2020 | 20 | 2020 |
Layerwise security protection for deep neural networks in industrial cyber physical systems W Jiang, Z Song, J Zhan, D Liu, J Wan IEEE Transactions on Industrial Informatics 18 (12), 8797-8806, 2022 | 19 | 2022 |
Research progress and challenges on application-driven adversarial examples: A survey W Jiang, Z He, J Zhan, W Pan, D Adhikari ACM Transactions on Cyber-Physical Systems (TCPS) 5 (4), 1-25, 2021 | 17 | 2021 |
Resource allocation of security-critical tasks with statistically guaranteed energy constraint W Jiang, K Jiang, Y Ma 2012 IEEE International Conference on Embedded and Real-Time Computing …, 2012 | 16 | 2012 |
Self-supervised scene-debiasing for video representation learning via background patching M Assefa, W Jiang, K Gedamu, G Yilma, B Kumeda, M Ayalew IEEE Transactions on Multimedia 25, 5500-5515, 2022 | 14 | 2022 |