default search action
Haihua Shen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c31]Xingquan Li
, Zengrong Huang, Simin Tao
, Zhipeng Huang, Chunan Zhuang, Hao Wang, Yifan Li, Yihang Qiu, Guojie Luo, Huawei Li, Haihua Shen, Mingyu Chen, Dongbo Bu, Wenxing Zhu, Ye Cai, Xiaoming Xiong, Ying Jiang, Yi Heng, Peng Zhang, Bei Yu, Biwei Xie, Yungang Bao:
iEDA: An Open-source infrastructure of EDA. ASPDAC 2024: 77-82 - [c30]Wenliang Liang, Hao Lin, Haihua Shen, Enbo Wang:
Orchestrating and Scheduling System for Workflows in Heterogeneous and Dynamic Environment. INFOCOM (Workshops) 2024: 1-6 - [c29]Zirui Jiang, Xiao Ji, Yiran He, Haihua Shen:
HWSim: Hardware Similarity Learning for Intellectual Property Piracy Detection. ISCAS 2024: 1-5 - [i4]Wenhao Lan, Yijun Yang, Haihua Shen, Shan Li:
CloudFort: Enhancing Robustness of 3D Point Cloud Classification Against Backdoor Attacks via Spatial Partitioning and Ensemble Prediction. CoRR abs/2404.14042 (2024) - 2023
- [j7]Xia Zhao, Bo Wu, Jinxin Xue
, Yue Shi, Mengying Zhao
, Xiaoqing Geng, Zhengbing Yan
, Haihua Shen, Jingyun Fang:
Mapping Forage Biomass and Quality of the Inner Mongolia Grasslands by Combining Field Measurements and Sentinel-2 Observations. Remote. Sens. 15(8): 1973 (2023) - [c28]Yilin Li
, Shan Li, Haihua Shen:
HTrans: Transformer-Based Method for Hardware Trojan Detection and Localization. ATS 2023: 1-6 - [c27]Peiheng Zhan, Haihua Shen, Shan Li, Huawei Li:
BGNN-HT: Bidirectional Graph Neural Network for Hardware Trojan Cells Detection at Gate Level. ISCAS 2023: 1-5 - [i3]Xingquan Li
, Simin Tao, Zengrong Huang, Shijian Chen, Zhisheng Zeng, Liwei Ni, Zhipeng Huang, Chunan Zhuang, Hongxi Wu, Weiguo Li, Xueyan Zhao, He Liu, Shuaiying Long, Wei He, Bojun Liu, Sifeng Gan, Zihao Yu, Tong Liu, Yuchi Miao, Zhiyuan Yan, Hao Wang, Jie Zhao, Yifan Li, Ruizhi Liu, Xiaoze Lin, Bo Yang, Zhen Xue, Fuxing Huang, Zonglin Yang, Zhenggang Wu, Jiangkao Li, Yuezuo Liu, Ming Peng, Yihang Qiu, Wenrui Wu, Zheqing Shao, Kai Mo, Jikang Liu, Yuyao Liang, Mingzhe Zhang, Zhuang Ma, Xiang Cong, Daxiang Huang, Guojie Luo, Huawei Li, Haihua Shen, Mingyu Chen, Dongbo Bu, Wenxing Zhu, Ye Cai, Xiaoming Xiong, Ying Jiang, Yi Heng, Peng Zhang, Biwei Xie, Yungang Bao:
iEDA: An Open-Source Intelligent Physical Implementation Toolkit and Library. CoRR abs/2308.01857 (2023) - 2022
- [c26]Hao Huang, Haihua Shen, Shan Li, Huawei Li:
A Hardware Trojan Trigger Localization Method in RTL based on Control Flow Features. ATS 2022: 138-143 - 2021
- [c25]Yunying Ye, Shan Li, Haihua Shen, Huawei Li, Xiaowei Li:
SeGa: A Trojan Detection Method Combined With Gate Semantics. ATS 2021: 43-48 - [c24]Yu Su, Haihua Shen, Renjie Lu, Yunying Ye:
A Stealthy Hardware Trojan Design and Corresponding Detection Method. ISCAS 2021: 1-6
2010 – 2019
- 2019
- [j6]Yiming Wang
, Yun Li, Haihua Shen
, Dongyu Fan, Wei Wang, Ling Li, Qi Liu
, Feng Zhang
, Xinghua Wang, Meng-Fan Chang
, Ming Liu
:
A Few-Step and Low-Cost Memristor Logic Based on MIG Logic for Frequent-Off Instant-On Circuits in IoT Applications. IEEE Trans. Circuits Syst. II Express Briefs 66-II(4): 662-666 (2019) - [c23]Renjie Lu, Haihua Shen, Yu Su, Huawei Li, Xiaowei Li
:
GramsDet: Hardware Trojan Detection Based on Recurrent Neural Network. ATS 2019: 111-116 - [c22]Wei Zhao, Renjie Lu, Zhenyu Cui, Haihua Shen:
Energy Optimization of Online Tracker for Mobile Devices. CSCWD 2019: 428-433 - [c21]Wei Zhao, Haihua Shen, Feng Zhang, Huazhe Tan:
Adaptive Power Optimization for Mobile Traffic Based on Machine Learning. CSCWD 2019: 500-505 - [i2]Renjie Lu, Haihua Shen, Feng Zhang, Huawei Li, Wei Zhao, Xiaowei Li:
HTDet: A Clustering Method using Information Entropy for Hardware Trojan Detection. CoRR abs/1906.06996 (2019) - 2018
- [j5]Qiang Lv, Yixin Chen, Zhaorong Li, Zhicheng Cui, Ling Chen, Xing Zhang, Haihua Shen:
Achieving data-driven actionability by combining learning and planning. Frontiers Comput. Sci. 12(5): 939-949 (2018) - [j4]Yun Cheng, Huawei Li, Ying Wang, Haihua Shen, Bo Liu, Xiaowei Li
:
On Trace Buffer Reuse-Based Trigger Generation in Post-Silicon Debug. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(10): 2166-2179 (2018) - [j3]Haihua Shen
, Huazhe Tan, Huawei Li
, Feng Zhang
, Xiaowei Li
:
LMDet: A "Naturalness" Statistical Method for Hardware Trojan Detection. IEEE Trans. Very Large Scale Integr. Syst. 26(4): 720-732 (2018) - [c20]Wei Zhao, Haihua Shen, Huawei Li, Xiaowei Li
:
Hardware Trojan Detection Based on Signal Correlation. ATS 2018: 80-85 - [c19]Hua-Zhe Tan, Wei Zhao, Haihua Shen:
Adaptive user interface optimization for multi-screen based on machine learning. CSCWD 2018: 743-748 - [c18]Hua-Zhe Tan, Wei Zhao, Haihua Shen:
A Context-Perceptual Privacy Protection Approach on Android Devices. ICC 2018: 1-7 - [c17]Feng Zhang, Dongyu Fan, Qi-Peng Lin, Qiang Huo, Yun Li, Lan Dai, Cheng-Ying Chen, Haihua Shen:
The application of non-volatile look-up-table operations based on multilevel-cell of resistance switching random access memory. VLSI-DAT 2018: 1-4 - 2017
- [j2]Junsheng Lv, You Li, Yumei Zhou, Jianzhong Zhao, Haihua Shen, Feng Zhang:
Wide-range tracking technique for process-variation-robust clock and data recovery applications. Frontiers Inf. Technol. Electron. Eng. 18(5): 729-737 (2017) - [c16]Yun Li, Haihua Shen, Ce Li, Feng Zhang:
An efficient parity rearrangement coding scheme for RRAM thermal crosstalk effects. ASICON 2017: 20-23 - [c15]Haihua Shen, Yuehui Zhao:
HTChecker: Detecting hardware trojans based on static characteristics. ISCAS 2017: 1-4 - [c14]Wenliang Liang, Yuanquan Wang, Bojie Li, Wenhui Wang, Jie Sheng, Yuchao Han, Haihua Shen, Liang Gu, Yuya Saito, Anass Benjebbour, Yoshihisa Kishiyama, Xin Wang, Xiaolin Hou, Huiling Jiang:
Ultra-high-throughput massive MIMO field-trial over radio computing architecture with peak spectrum efficiency of 79.82 bps/Hz. PIMRC 2017: 1-7 - [c13]Wenliang Liang, Yuanquan Wang, Keyu Song, Bojie Li, Wenhui Wang, Xiao Wang, Haihua Shen, Shenfei Zhang, Dong Han, Liang Gu, Yuuya Saito, Anass Benjebbour, Yoshihisa Kishiyama:
Field Trial Investigation of Wired and Wireless Calibration Schemes for Real-Time Massive MIMO Prototype. VTC Fall 2017: 1-6 - 2016
- [j1]Cheng-Ying Chen, Hongbin Sun, Haihua Shen, Feng Zhang:
A 128 Kb HfO2 ReRAM with Novel Double-Reference and Dynamic-Tracking scheme for write yield improvement. IEICE Electron. Express 13(6): 20160061 (2016) - [c12]Zhihua Feng, Huazhe Tan, Haihua Shen:
Relationship Privacy Protection for Mobile Social Network. CBD 2016: 215-220 - [c11]Xin Wang, Xiaolin Hou, Huiling Jiang, Anass Benjebbour, Yuya Saito, Yoshihisa Kishiyama, Jing Qiu, Haihua Shen, Chen Tang, Tingjian Tian, Tsuyoshi Kashima:
Large scale experimental trial of 5G mobile communication systems - TDD massive MIMO with linear and non-linear precoding schemes. PIMRC 2016: 1-5 - [i1]Qiang Lyu, Yixin Chen, Zhaorong Li, Zhicheng Cui, Ling Chen, Xing Zhang, Haihua Shen:
Extracting Actionability from Machine Learning Models by Sub-optimal Deterministic Planning. CoRR abs/1611.00873 (2016) - 2011
- [c10]Qi Guo, Tianshi Chen, Haihua Shen, Yunji Chen
, Yue Wu, Weiwu Hu:
Empirical design bugs prediction for verification. DATE 2011: 161-166 - 2010
- [c9]Bowen Chen, Haihua Shen, Wenhui Zhang:
Formula-Oriented Compositional Minimization in Model Checking. Asian Test Symposium 2010: 81-84 - [c8]Qi Guo, Tianshi Chen, Haihua Shen, Yunji Chen
, Weiwu Hu:
On-the-Fly Reduction of Stimuli for Functional Verification. Asian Test Symposium 2010: 448-454 - [c7]Qi Guo, Tianshi Chen, Haihua Shen, Yunji Chen
:
Estimating design quality of digital systems via machine learning. ICECS 2010: 623-626
2000 – 2009
- 2009
- [c6]Yunji Chen
, Yi Lv, Weiwu Hu, Tianshi Chen, Haihua Shen, Pengyu Wang, Hong Pan:
Fast complete memory consistency verification. HPCA 2009: 381-392 - [c5]Haihua Shen, Pengyu Wang, Yunji Chen
, Qi Guo, Heng Zhang:
Designing an Effective Constraint Solver in Coverage Directed Test Generation. ICESS 2009: 388-395 - 2008
- [c4]Haihua Shen, Wenli Wei, Yunji Chen
, Bowen Chen, Qi Guo:
Coverage Directed Test Generation: Godson Experience. ATS 2008: 321-326 - 2007
- [c3]Haihua Shen, Heng Zhang:
An Accurate Analysis of Microprocessor Design Verification. ATS 2007: 165-171 - 2005
- [c2]Haihua Shen, Lin Ma, Heng Zhang:
CRPG: a configurable random test-program generator for microprocessors. ISCAS (4) 2005: 4171-4174 - 2004
- [c1]Haihua Shen, Yunji Chen
, Jing Huang:
EmGen: An Automatic Test-Program Generation Tool for Embedded IP Cores. ICESS 2004: 528-535
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-13 00:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint