An accurate detailed routing routability prediction model in placement Q Zhou, X Wang, Z Qi, Z Chen, Q Zhou, Y Cai 2015 6th Asia Symposium on Quality Electronic Design (ASQED), 119-122, 2015 | 68 | 2015 |
Exploiting spin-orbit torque devices as reconfigurable logic for circuit obfuscation J Yang, X Wang, Q Zhou, Z Wang, H Li, Y Chen, W Zhao IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2018 | 38 | 2018 |
Efficient computation reduction in Bayesian neural networks through feature decomposition and memorization X Jia, J Yang, R Liu, X Wang, SD Cotofana, W Zhao IEEE transactions on neural networks and learning systems 32 (4), 1703-1712, 2020 | 29 | 2020 |
Secure and low-overhead circuit obfuscation technique with multiplexers X Wang, X Jia, Q Zhou, Y Cai, J Yang, M Gao, G Qu Proceedings of the 26th edition on Great Lakes Symposium on VLSI, 133-136, 2016 | 27 | 2016 |
Triangle counting accelerations: From algorithm to in-memory computing architecture X Wang, J Yang, Y Zhao, X Jia, R Yin, X Chen, G Qu, W Zhao IEEE Transactions on Computers 71 (10), 2462-2472, 2021 | 15 | 2021 |
NAND-SPIN-based processing-in-MRAM architecture for convolutional neural network acceleration Y Zhao, J Yang, B Li, X Cheng, X Ye, X Wang, X Jia, Z Wang, Y Zhang, ... Science China Information Sciences 66 (4), 142401, 2023 | 11 | 2023 |
Accelerating Graph-Connected Component Computation With Emerging Processing-In-Memory Architecture X Chen, X Wang, X Jia, J Yang, G Qu, W Zhao IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2022 | 11 | 2022 |
Reconfigurable and dynamically transformable In-Cache-MPUF system with true randomness based on the SOT-MRAM Z Hou, Z Wang, C Wang, M Wang, Y Wang, X Wang, C Duan, J Yang IEEE Transactions on Circuits and Systems I: Regular Papers 69 (7), 2694-2706, 2022 | 10 | 2022 |
Is the secure IC camouflaging really secure? X Wang, Q Zhou, Y Cai, G Qu 2016 IEEE International Symposium on Circuits and Systems (ISCAS), 1710-1713, 2016 | 10 | 2016 |
Spear and shield: Evolution of integrated circuit camouflaging XY Wang, Q Zhou, YC Cai, G Qu Journal of Computer Science and Technology 33, 42-57, 2018 | 9 | 2018 |
TCIM: Triangle Counting Acceleration With Processing-In-MRAM Architecture X Wang, J Yang, Y Zhao, Y Qi, M Liu, X Cheng, X Jia, X Chen, G Qu, ... 2020 57th ACM/IEEE Design Automation Conference (DAC), 1-6, 2020 | 8 | 2020 |
Toward a formal and quantitative evaluation framework for circuit obfuscation methods X Wang, Q Zhou, Y Cai, G Qu IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2018 | 8 | 2018 |
An STT-MRAM based reconfigurable computing-in-memory architecture for general purpose computing Y Pan, X Jia, Z Cheng, P Ouyang, X Wang, J Yang, W Zhao CCF Transactions on High Performance Computing 2, 272-281, 2020 | 7 | 2020 |
Parallelizing SAT-based de-camouflaging attacks by circuit partitioning and conflict avoiding X Wang, Q Zhou, Y Cai, G Qu Integration 67, 108-120, 2019 | 7 | 2019 |
Gate camouflaging-based obfuscation X Wang, M Gao, Q Zhou, Y Cai, G Qu Hardware Protection through Obfuscation, 89-102, 2017 | 7 | 2017 |
IMGA: Efficient In-Memory Graph Convolution Network Aggregation with Data Flow Optimizations Y Wei, X Wang, S Zhang, J Yang, X Jia, Z Wang, G Qu, W Zhao IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023 | 6 | 2023 |
An Energy-Efficient Bayesian Neural Network Implementation Using Stochastic Computing Method X Jia, H Gu, Y Liu, J Yang, X Wang, W Pan, Y Zhang, S Cotofana, W Zhao IEEE Transactions on Neural Networks and Learning Systems, 2023 | 6 | 2023 |
Hardware Security in Spin-based Computing-in-memory: Analysis, Exploits, and Mitigation Techniques X Wang, J Yang, Y Zhao, X Jia, G Qu, W Zhao ACM Journal on Emerging Technologies in Computing Systems (JETC) 16 (4), 1-18, 2020 | 6 | 2020 |
An efficient technique to reverse engineer minterm protection based camouflaged circuit S Jiang, N Xu, XY Wang, Q Zhou Journal of Computer Science and Technology 33, 998-1006, 2018 | 6 | 2018 |
A conflict-free approach for parallelizing SAT-based de-camouflaging attacks X Wang, Q Zhou, Y Cai, G Qu 2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC), 259-264, 2018 | 6 | 2018 |