default search action
Xiang Wang 0006
Person information
- affiliation: Beihang University, School of Electronic and Information Engineering, Beijing, China
Other persons with the same name
- Xiang Wang — disambiguation page
- Xiang Wang 0001 — IBM T. J. Watson Research Center, Yorktown Heights, NY, USA (and 1 more)
- Xiang Wang 0002 — Tsinghua University, School of Software, Beijing, China
- Xiang Wang 0003 — Tsinghua University, Department of Electronic Engineering, Beijing, China
- Xiang Wang 0004 — Xiamen University of Technology, Department of Mechanical and Electrical Engineering, China
- Xiang Wang 0005 — Nankai University, Tianjin, China
- Xiang Wang 0007 — The University of New South Wales, School of Computer Science and Engineering, Sydney, Australia
- Xiang Wang 0008 — University of Alberta, Department of Electrical and Computer Engineering, Edmonton, AB, Canada
- Xiang Wang 0009 — Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China (and 1 more)
- Xiang Wang 0010 — University of Science and Technology of China, CCCD Key Lab of Ministry of Culture and Tourism, Hefei, China (and 1 more)
- Xiang Wang 0011 — Duke University, Department of Computer Science, Durham, NC, USA
- Xiang Wang 0012 — Huazhong University of Science and Technology, Wuhan, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Dongdong Xu, Xiang Wang, Qiang Hao, Jiqing Wang, Shuangjie Cui, Bo Liu:
A High-Performance Transparent Memory Data Encryption and Authentication Scheme Based on Ascon Cipher. IEEE Trans. Very Large Scale Integr. Syst. 32(5): 925-937 (2024) - 2023
- [j25]Yuhao Zhou, Zhenxue He, Yan Zhang, Jia Liu, Tao Wang, Limin Xiao, Xiang Wang:
Power Optimization for Mixed Polarity Reed-Muller Circuits Based on Multilevel Adaptive Memetic Algorithm. Int. J. Intell. Syst. 2023: 1-18 (2023) - [j24]Yuhao Zhou, Zhenxue He, Jianhui Jiang, Jia Liu, Juncai He, Tao Wang, Limin Xiao, Xiang Wang:
Fast Area Optimization Approach for XNOR/OR-based Fixed Polarity Reed-Muller Logic Circuits based on Multi-strategy Wolf Pack Algorithm. ACM Trans. Design Autom. Electr. Syst. 28(3): 45:1-45:16 (2023) - 2022
- [j23]Yuhao Zhou, Zhenxue He, Tao Wang, Zhisheng Huo, Limin Xiao, Xiang Wang:
Area and power optimization approach for mixed polarity Reed-Muller logic circuits based on multi-strategy bacterial foraging algorithm. Appl. Soft Comput. 130: 109720 (2022) - [j22]Dongdong Xu, Xiang Wang, Yuanchao Hao, Zhun Zhang, Qiang Hao, Haoyu Jia, Haifeng Dong, Longbing Zhang:
Ring-ExpLWE: A High-Performance and Lightweight Post-Quantum Encryption Scheme for Resource-Constrained IoT Devices. IEEE Internet Things J. 9(23): 24122-24134 (2022) - [j21]Yuhao Zhou, Zhenxue He, Chen Chen, Tao Wang, Limin Xiao, Xiang Wang:
An Efficient Power Optimization Approach for Fixed Polarity Reed-Muller Logic Circuits Based on Metaheuristic Optimization Algorithm. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(12): 5380-5393 (2022) - [j20]Dongdong Xu, Xiang Wang, Yuanchao Hao, Zhun Zhang, Qiang Hao, Zhiyu Zhou:
A More Accurate and Robust Binary Ring-LWE Decryption Scheme and Its Hardware Implementation for IoT Devices. IEEE Trans. Very Large Scale Integr. Syst. 30(8): 1007-1019 (2022) - 2021
- [j19]Zhenxue He, Yu-hua Pan, Ke-jian Wang, Limin Xiao, Xiang Wang:
Area optimization for MPRM logic circuits based on improved multiple disturbances fireworks algorithm. Appl. Math. Comput. 399: 126008 (2021) - [j18]Zhenxue He, Limin Xiao, Xiang Wang:
Minimization for ternary fixed polarity Reed-Muller expressions based on ternary quantum shuffled frog leaping algorithm. Appl. Soft Comput. 110: 107647 (2021) - [j17]Zhenxue He, Xiaoqian Wu, Chao Wang, Zhisheng Huo, Limin Xiao, Xiang Wang:
Delay optimization for ternary fixed polarity Reed-Muller circuits based on multilevel adaptive quantum genetic algorithm. Int. J. Intell. Syst. 36(10): 5981-6006 (2021) - 2020
- [j16]Tao Wang, Xiang Wang, Wei Shi, Zongmin Zhao, Zhenxue He, Tongsheng Xia:
Target localization and tracking based on improved Bayesian enhanced least-squares algorithm in wireless sensor networks. Comput. Networks 167 (2020) - [j15]Xiang Wang, Zongmin Zhao, Dongdong Xu, Zhun Zhang, Qiang Hao, Mengchen Liu:
An M-Cache-Based Security Monitoring and Fault Recovery Architecture for Embedded Processor. IEEE Trans. Very Large Scale Integr. Syst. 28(11): 2314-2327 (2020)
2010 – 2019
- 2019
- [j14]Zhenxue He, Limin Xiao, Zhisheng Huo, Tao Wang, Xiang Wang:
Fast Minimization of Fixed Polarity Reed-Muller Expressions. IEEE Access 7: 24843-24851 (2019) - [j13]Zhenxue He, Jia Liu, Limin Xiao, Zhisheng Huo, Xiang Wang:
A Polarity Optimization Algorithm Taking Into Account Polarity Conversion Sequence. IEEE Access 7: 54809-54818 (2019) - [j12]Zhenxue He, Limin Xiao, Fei Gu, Li Ruan, Zhisheng Huo, Mingzhe Li, Mingfa Zhu, Longbing Zhang, Rui Liu, Xiang Wang:
EDOA: an efficient delay optimization approach for mixed-polarity Reed-Muller logic circuits under the unit delay model. Frontiers Comput. Sci. 13(5): 1102-1115 (2019) - [j11]Xiang Wang, Zongmin Zhao, Tao Wang, Zhun Zhang, Qiang Hao, Xiao-Ying Li:
A LS-SVM based Measurement Points Classification Algorithm for Adjacent Targets in WSNs. Sensors 19(24): 5555 (2019) - [j10]Zongmin Zhao, Xiang Wang, Tao Wang:
A Novel Measurement Data Classification Algorithm Based on SVM for Tracking Closely Spaced Targets. IEEE Trans. Instrum. Meas. 68(4): 1089-1100 (2019) - [c22]Xiang Wang, Tao Wang, Zongmin Zhao, Pei Du, Weike Wang, Yuntong Tian, Qiang Hao, Zhun Zhang:
Data Communication Security Based on Novel Reversible Mean Shift Steganography Algorithm. ICCE 2019: 1-5 - 2018
- [j9]Bin Xu, Weike Wang, Qiang Hao, Zhun Zhang, Pei Du, Tongsheng Xia, Hongge Li, Xiang Wang:
A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device. IEEE Access 6: 72862-72869 (2018) - [j8]Pei Du, Xiang Wang, Weike Wang, Lin Li, Tongsheng Xia, Hongge Li:
Hardware-assisted integrity monitor based on lightweight hash function. IEICE Electron. Express 15(10): 20180107 (2018) - [j7]Xiang Wang, Lin Li, Weike Wang, Pei Du:
Online learning based on a novel cost function for system power management. IET Comput. Digit. Tech. 12(5): 227-232 (2018) - [j6]Xiang Wang, Weike Wang, Bin Xu, Pei Du, Lin Li, Muyang Liu:
A Fine-Grained Hardware Security Approach for Runtime Code Integrity in Embedded Systems. J. Univers. Comput. Sci. 24(4): 515-536 (2018) - [c21]Xiang Wang, Yuntong Tian, Pei Du, Xiaobing Zhang, Weike Wang, Qiang Hao, Bing Xu, Zhun Zhang, Zongmin Zhao:
An Optimized Method of Hardware Implementation for LHash in the Embedded System. CSAE 2018: 181:1-181:5 - 2017
- [j5]Zhenxue He, Limin Xiao, Fei Gu, Tongsheng Xia, Shubin Su, Zhisheng Huo, Rong Zhang, Longbing Zhang, Li Ruan, Xiang Wang:
An efficient and fast polarity optimization approach for mixed polarity Reed-Muller logic circuits. Frontiers Comput. Sci. 11(4): 728-742 (2017) - [j4]Xiang Wang, Tao Wang, Shiyang Chen, Renhao Fan, Yang Xu, Weike Wang, Hongge Li, Tongsheng Xia:
Track fusion based on threshold factor classification algorithm in wireless sensor networks. Int. J. Commun. Syst. 30(7) (2017) - [j3]Zhenxue He, Limin Xiao, Li Ruan, Fei Gu, Zhisheng Huo, Guangjun Qin, Mingfa Zhu, Longbing Zhang, Rui Liu, Xiang Wang:
A Power and Area Optimization Approach of Mixed Polarity Reed-Muller Expression for Incompletely Specified Boolean Functions. J. Comput. Sci. Technol. 32(2): 297-311 (2017) - [c20]Weike Wang, Muyang Liu, Pei Du, Zongmin Zhao, Yuntong Tian, Qiang Hao, Xiang Wang:
An Architectural-Enhanced Secure Embedded System with a Novel Hybrid Search Scheme. ICSSA 2017: 116-120 - [c19]Xiang Wang, Mingzhe Li, Zhenxue He, Weike Wang, Cheng Zhou, Zongmin Zhao:
PAOA: A power and area optimization approach of reed-muller logic circuits. MWSCAS 2017: 1394-1397 - [c18]Zhenxue He, Guangjun Qin, Limin Xiao, Fei Gu, Zhisheng Huo, Li Ruan, Haitao Wang, Longbing Zhang, Jianbin Liu, Shaobo Liu, Xiang Wang:
An Efficient Polarity Optimization Approach for Fixed Polarity Reed-Muller Logic Circuits Based on Novel Binary Differential Evolution Algorithm. NPC 2017: 118-121 - 2016
- [c17]Zhenxue He, Limin Xiao, Longbing Zhang, Fei Gu, Zhisheng Huo, Mingfa Zhu, Li Ruan, Rui Liu, Xiang Wang:
EMA-FPRMs: An efficient minimization algorithm for fixed polarity Reed-Muller expressions. FPT 2016: 253-256 - 2015
- [j2]Xiang Wang, Ying Lu, Yi Zhang, Zexi Zhao, Tongsheng Xia, Limin Xiao:
Power Optimization in Logic Synthesis for Mixed Polarity Reed-Muller Logic Circuits. Comput. J. 58(6): 1306-1313 (2015) - [c16]Xiang Wang, Lin Li, Longbin Zhang, Weike Wang, Rong Zhang, Yi Zhang, Quanneng Shen:
A multi-level collaboration low-power design based on embedded system. SoCC 2015: 186-190 - [c15]Limin Xiao, Zhenxue He, Li Ruan, Rong Zhang, Tongsheng Xia, Xiang Wang:
Optimization of best polarity searching for mixed polarity reed-muller logic circuit. SoCC 2015: 275-280 - [c14]Xiang Wang, Pei Du, Quanneng Shen, Bin Xu, Lin Li, Weike Wang, Tongsheng Xia:
An Improved S-Box of Lightweight Hash Function SPOGENT. UIC/ATC/ScalCom 2015: 1115-1119 - [c13]Xiang Wang, Shiyang Chen, Xiaocui Wang, Yang Xu, Rong Zhang, Tao Wang, Bin Xu:
Threshold Factor Track Classification Algorithm Based on Target Motion Model. UIC/ATC/ScalCom 2015: 1163-1168 - [c12]Xiang Wang, Rong Zhang, Weike Wang, Zhenxue He, Lin Li, Quanneng Shen, Li Ruan, Limin Xiao:
Polarity Searching for MPRM Logic Circuit Based on Improved Adaptive Genetic Algorithm. UIC/ATC/ScalCom 2015: 1354-1358 - [c11]Xiang Wang, Quanneng Shen, Pei Du, Rong Zhang, Weike Wang, Lin Li, Bin Xu, Huihui Ji:
Hardware-Assisted Monitoring for Code Security in Embedded System. UIC/ATC/ScalCom 2015: 1393-1396 - [c10]Xiang Wang, Liping Wang, Yuanchen Bai, Zhenxue He, Tao Wang, Bin Xu, He Zhang, Xiaocui Wang, Cheng Zhou, Weike Wang, Pei Du:
Optimization of Elliptic Curve Cryptography Resisting Power Attack Scalar Multiplication Algorithm in Security System on Chip. UIC/ATC/ScalCom 2015: 1397-1401 - 2014
- [j1]Xiang Wang, Guangqian Yuan, Xun Wang, Zexi Zhao, Kan Wang:
Communication and monitor of breast cancer signal in the pulse-output genetic circuit network. Sci. China Inf. Sci. 57(3): 1-10 (2014) - 2013
- [c9]Xiang Wang, Ying Lu, Yi Zhang, Zexi Zhao, Tongsheng Xia, Jishun Cui, Limin Xiao:
Probabilistic Modeling during Power Estimation for Mixed Polarity Reed-Muller Logic Circuits. GreenCom/iThings/CPScom 2013: 1414-1418 - [c8]Xiang Wang, Guangqian Yuan, Xun Wang, Zexi Zhao:
Pulse-Output Monitor Genetic Circuit of Breast Cancer Testing. GreenCom/iThings/CPScom 2013: 1722-1728 - [c7]Xiang Wang, Zexi Zhao, Ying Lu, Yi Zhang:
A Design of Security Module to Protect Program Execution in Embedded System. GreenCom/iThings/CPScom 2013: 1750-1755 - [c6]Xiang Wang, Bo Yin, Ying Lu, Bin Xu, Pei Du, Limin Xiao:
Iterative Threshold Selection for TOA Estimation of IR-UWB System. GreenCom/iThings/CPScom 2013: 1763-1766 - [c5]Renhao Fan, Xiang Wang, Jordi Madrenas:
A Novel Alternative Exponent-Weighted Fuzzy C-Means Algorithm. GreenCom/iThings/CPScom 2013: 1767-1772 - [c4]Pilong Yang, Tongsheng Xia, Hongge Li, Xiang Wang:
A Temperature Insensitive Ring Oscillator for Low Power RF Communications. GreenCom/iThings/CPScom 2013: 1804-1809 - [c3]Limin Xiao, Yao Zheng, Wenqi Tang, Guangchao Yao, Li Ruan, Xiang Wang:
A GPU-Accelerated Large-Scale Music Similarity Retrieval Method. GreenCom/iThings/CPScom 2013: 1839-1843 - [c2]Li Ruan, Jinbing Peng, Limin Xiao, Xiang Wang:
CloudDVMM: Distributed Virtual Machine Monitor for Cloud Computing. GreenCom/iThings/CPScom 2013: 1853-1858 - [c1]Li Ruan, Qimeng Wu, Limin Xiao, Ke Xie, Xiang Wang:
Metadata-Intensive I/O Performance Optimization by Merging Read/Write Requests. GreenCom/iThings/CPScom 2013: 1859-1864
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint