default search action
Sheng Wei 0001
Person information
- affiliation: Rutgers University, Piscataway, NJ, USA
- affiliation (former): University of Nebraska-Lincoln, Department of Computer Science and Engineering, , NE, USA
- affiliation (PhD 2013): University of California at Los Angeles, CA, USA
Other persons with the same name
- Sheng Wei 0002 — TU Munich, Germany
- Sheng Wei 0003 — Anhui University, Key Laboratory of Intelligent Computing and Signal Processing, China
- Sheng Wei 0005 — Nanjing University, School of Architecture and Urban Planning / Jiangsu Institute of Urban Planning and Design, China
- Sheng Wei 0006 — Zhejiang University of Technology, Hangzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c56]Ke Xia, Sheng Wei:
DM-TEE: Trusted Execution Environment for Disaggregated Memory. ACM Great Lakes Symposium on VLSI 2024: 204-209 - [i2]Zhongze Tang, Mengmei Ye, Yao Liu, Sheng Wei:
Privacy-Preserving Multimedia Mobile Cloud Computing Using Protective Perturbation. CoRR abs/2409.01710 (2024) - 2023
- [c55]Ke Xia, Sheng Wei:
DF-TEE: Trusted Execution Environment for Disaggregated Multi-FPGA Cloud Systems. AsianHOST 2023: 1-6 - [c54]Zichen Zhu, Stefano Petrangeli, Viswanathan Swaminathan, Sheng Wei:
Power Efficient Mobile VTuber Live Streaming. MMAsia 2023: 54:1-54:7 - [c53]Zhongze Tang, Huy Phan, Xianglong Feng, Bo Yuan, Yao Liu, Sheng Wei:
Security-Preserving Live 3D Video Surveillance. MMSys 2023: 266-277 - 2022
- [c52]Yiqin Zhao, Sheng Wei, Tian Guo:
Privacy-preserving Reflection Rendering for Augmented Reality. ACM Multimedia 2022: 2909-2918 - [c51]Mengmei Ye, Zhongze Tang, Huy Phan, Yi Xie, Bo Yuan, Sheng Wei:
Visual privacy protection in mobile image recognition using protective perturbation. MMSys 2022: 164-176 - [c50]Zichen Zhu, Xianglong Feng, Zhongze Tang, Nan Jiang, Tian Guo, Lisong Xu, Sheng Wei:
Power-efficient live virtual reality streaming using edge offloading. NOSSDAV 2022: 57-63 - [i1]Yiqin Zhao, Sheng Wei, Tian Guo:
Privacy-preserving Reflection Rendering for Augmented Reality. CoRR abs/2207.03056 (2022) - 2021
- [j8]Xianglong Feng, Zeyang Bao, Sheng Wei:
LiveObj: Object Semantics-based Viewport Prediction for Live Mobile Virtual Reality Streaming. IEEE Trans. Vis. Comput. Graph. 27(5): 2736-2745 (2021) - [c49]Ke Xia, Yukui Luo, Xiaolin Xu, Sheng Wei:
SGX-FPGA: Trusted Execution Environment for CPU-FPGA Heterogeneous Architecture. DAC 2021: 301-306 - [c48]Xianglong Feng, Mengmei Ye, Ke Xia, Sheng Wei:
Runtime Fault Injection Detection for FPGA-based DNN Execution Using Siamese Path Verification. DATE 2021: 786-789 - [c47]Nan Jiang, Mehmet Can Vuran, Sheng Wei, Lisong Xu:
QoS-Aware Network Energy Optimization for Danmu Video Streaming in WiFi Networks. IWQoS 2021: 1-10 - [c46]Xianglong Feng, Yi Xie, Mengmei Ye, Zhongze Tang, Bo Yuan, Sheng Wei:
Fake Gradient: A Security and Privacy Protection Framework for DNN-based Image Classification. ACM Multimedia 2021: 5510-5518 - [c45]Xianglong Feng, Weitian Li, Sheng Wei:
LiveROI: region of interest analysis for viewport prediction in live mobile virtual reality streaming. MMSys 2021: 132-145 - 2020
- [c44]Akshay Gangal, Mengmei Ye, Sheng Wei:
HybridTEE: Secure Mobile DNN Execution Using Hybrid Trusted Execution Environment. AsianHOST 2020: 1-6 - [c43]Zhongze Tang, Xianglong Feng, Yi Xie, Huy Phan, Tian Guo, Bo Yuan, Sheng Wei:
VVSec: Securing Volumetric Video Streaming via Benign Use of Adversarial Perturbation. ACM Multimedia 2020: 3614-3623 - [c42]Chao Zhou, Shuoqian Wang, Mengbai Xiao, Sheng Wei, Yao Liu:
AdaP-360: User-Adaptive Area-of-Focus Projections for Bandwidth-Efficient 360-Degree Video Streaming. ACM Multimedia 2020: 3715-3723 - [c41]Nan Jiang, Yao Liu, Tian Guo, Wenyao Xu, Viswanathan Swaminathan, Lisong Xu, Sheng Wei:
QuRate: power-efficient mobile immersive video streaming. MMSys 2020: 99-111 - [c40]Xianglong Feng, Yao Liu, Sheng Wei:
LiveDeep: Online Viewport Prediction for Live Virtual Reality Streaming Using Lifelong Deep Learning. VR 2020: 800-808
2010 – 2019
- 2019
- [j7]Xianglong Feng, Viswanathan Swaminathan, Sheng Wei:
Viewport Prediction for Live 360-Degree Mobile Video Streaming Using User-Content Hybrid Motion Tracking. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(2): 43:1-43:22 (2019) - [j6]Nianhang Hu, Mengmei Ye, Sheng Wei:
Surviving Information Leakage Hardware Trojan Attacks Using Hardware Isolation. IEEE Trans. Emerg. Top. Comput. 7(2): 253-261 (2019) - [c39]Xianglong Feng, Zeyang Bao, Sheng Wei:
Exploring CNN-Based Viewport Prediction for Live Virtual Reality Streaming. AIVR 2019: 183-186 - [c38]Mengmei Ye, Xianglong Feng, Sheng Wei:
Runtime Hardware Security Verification Using Approximate Computing: A Case Study on Video Motion Detection. AsianHOST 2019: 1-6 - [c37]Zichen Zhu, Nan Jiang, Tian Guo, Sheng Wei:
Virtual reality streaming at the edge: a power perspective: poster. SEC 2019: 316-318 - 2018
- [c36]Zhengxiong Li, Aditya Singh Rathore, Chen Song, Sheng Wei, Yanzhi Wang, Wenyao Xu:
PrinTracker: Fingerprinting 3D Printers using Commodity Scanners. CCS 2018: 1306-1323 - [c35]Mengmei Ye, Jonathan Sherman, Witawas Srisa-an, Sheng Wei:
TZSlicer: Security-aware dynamic program slicing for hardware isolation. HOST 2018: 17-24 - [c34]Mengmei Ye, Xianglong Feng, Sheng Wei:
HISA: hardware isolation-based secure architecture for CPU-FPGA embedded systems. ICCAD 2018: 90 - [c33]Mengmei Ye, Myra B. Cohen, Witawas Srisa-an, Sheng Wei:
EvoIsolator: Evolving Program Slices for Hardware Isolation Based Security. SSBSE 2018: 377-382 - 2017
- [c32]Mengmei Ye, Mehrdad Zaker Shahrak, Sheng Wei:
PUFSec: Protecting physical unclonable functions using hardware isolation-based system security techniques. AsianHOST 2017: 7-12 - [c31]Xianglong Feng, Mengmei Ye, Viswanathan Swaminathan, Sheng Wei:
Towards the Security of Motion Detection-based Video Surveillance on IoT Devices. ACM Multimedia (Thematic Workshops) 2017: 228-235 - [c30]Nan Jiang, Viswanathan Swaminathan, Sheng Wei:
Power Evaluation of 360 VR Video Streaming on Head Mounted Display Devices. NOSSDAV 2017: 55-60 - 2016
- [c29]Mengmei Ye, Nianhang Hu, Sheng Wei:
Lightweight secure sensing using hardware isolation. IEEE SENSORS 2016: 1-3 - [c28]Mengbai Xiao, Viswanathan Swaminathan, Sheng Wei, Songqing Chen:
DASH2M: Exploring HTTP/2 for Internet Streaming to Mobile Devices. ACM Multimedia 2016: 22-31 - [c27]Mehrdad Zaker Shahrak, Mengmei Ye, Viswanathan Swaminathan, Sheng Wei:
Two-way real time multimedia stream authentication using physical unclonable functions. MMSP 2016: 1-4 - [c26]Jingyu Zhang, Gan Fang, Chunyi Peng, Minyi Guo, Sheng Wei, Viswanathan Swaminathan:
Profiling energy consumption of DASH video streaming over 4G LTE networks. MoVid@MMSys 2016: 3:1-3:6 - [c25]Mengbai Xiao, Viswanathan Swaminathan, Sheng Wei, Songqing Chen:
Evaluating and improving push based video streaming with HTTP/2. NOSSDAV 2016: 3:1-3:6 - 2015
- [c24]Sheng Wei, Viswanathan Swaminathan, Mengbai Xiao:
Power efficient mobile video streaming using HTTP/2 server push. MMSP 2015: 1-6 - 2014
- [j5]Sheng Wei, Miodrag Potkonjak:
Self-Consistency and Consistency-Based Detection and Diagnosis of Malicious Circuitry. IEEE Trans. Very Large Scale Integr. Syst. 22(9): 1845-1853 (2014) - [c23]Sheng Wei, James B. Wendt, Ani Nahapetian, Miodrag Potkonjak:
Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels. DAC 2014: 90:1-90:6 - [c22]Sheng Wei, Viswanathan Swaminathan:
Cost effective video streaming using server push over HTTP 2.0. MMSP 2014: 1-5 - [c21]Sheng Wei, Viswanathan Swaminathan:
Low Latency Live Video Streaming over HTTP 2.0. NOSSDAV 2014: 37 - 2013
- [b1]Sheng Wei:
Consistency-based System Security Techniques. University of California, Los Angeles, USA, 2013 - [j4]Sheng Wei, Ani Nahapetian, Miodrag Potkonjak:
Quantitative Intellectual Property Protection Using Physical-Level Characterization. IEEE Trans. Inf. Forensics Secur. 8(11): 1722-1730 (2013) - [c20]Sheng Wei, Miodrag Potkonjak:
The undetectable and unprovable hardware trojan horse. DAC 2013: 144:1-144:2 - [c19]Sheng Wei, Jason Xin Zheng, Miodrag Potkonjak:
Low power FPGA design using post-silicon device aging (abstract only). FPGA 2013: 277 - [c18]Sheng Wei, Jason Xin Zheng, Miodrag Potkonjak:
Aging-based leakage energy reduction in FPGAs. FPL 2013: 1-4 - [c17]Sheng Wei, Miodrag Potkonjak:
Malicious circuitry detection using fast timing characterization via test points. HOST 2013: 113-118 - [c16]Viswanathan Swaminathan, Sheng Wei:
Offline protected video playback on heterogeneous platforms. ICME Workshops 2013: 1-4 - [c15]Viswanathan Swaminathan, Saayan Mitra, Sheng Wei:
Designing a universal format for encrypted media. MMSP 2013: 64-69 - [c14]Nathaniel A. Conos, Saro Meguerdichian, Sheng Wei, Miodrag Potkonjak:
Maximizing yield in Near-Threshold Computing under the presence of process variation. PATMOS 2013: 1-8 - [c13]Sheng Wei, Jong Hoon Ahnn, Miodrag Potkonjak:
Energy attacks and defense techniques for wireless systems. WISEC 2013: 185-194 - 2012
- [j3]Sheng Wei, Ani Nahapetian, Michael Nelson, Farinaz Koushanfar, Miodrag Potkonjak:
Gate Characterization Using Singular Value Decomposition: Foundations and Applications. IEEE Trans. Inf. Forensics Secur. 7(2): 765-773 (2012) - [j2]Sheng Wei, Miodrag Potkonjak:
Scalable Hardware Trojan Diagnosis. IEEE Trans. Very Large Scale Integr. Syst. 20(6): 1049-1057 (2012) - [c12]Sheng Wei, Kai Li, Farinaz Koushanfar, Miodrag Potkonjak:
Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry. DAC 2012: 90-95 - [c11]Sheng Wei, Kai Li, Farinaz Koushanfar, Miodrag Potkonjak:
Provably complete hardware Trojan detection using test point insertion. ICCAD 2012: 569-576 - [c10]Sheng Wei, Miodrag Potkonjak:
Wireless security techniques for coordinated manufacturing and on-line hardware trojan detection. WISEC 2012: 161-172 - 2011
- [j1]Sheng Wei, Saro Meguerdichian, Miodrag Potkonjak:
Malicious Circuitry Detection Using Thermal Conditioning. IEEE Trans. Inf. Forensics Secur. 6(3-2): 1136-1145 (2011) - [c9]Miodrag Potkonjak, Saro Meguerdichian, Ani Nahapetian, Sheng Wei:
Differential public physically unclonable functions: architecture and applications. DAC 2011: 242-247 - [c8]Sheng Wei, Miodrag Potkonjak:
Integrated circuit security techniques using variable supply voltage. DAC 2011: 248-253 - [c7]Sheng Wei, Farinaz Koushanfar, Miodrag Potkonjak:
Integrated circuit digital rights management techniques using physical level characterization. Digital Rights Management Workshop 2011: 3-14 - [c6]Sheng Wei, Ani Nahapetian, Miodrag Potkonjak:
Robust passive hardware metering. ICCAD 2011: 802-809 - [c5]Viswanathan Swaminathan, Sheng Wei:
Low latency live video streaming using HTTP chunked encoding. MMSP 2011: 1-6 - [c4]Sheng Wei, Miodrag Potkonjak:
Scalable consistency-based hardware trojan detection and diagnosis. NSS 2011: 176-183 - 2010
- [c3]Sheng Wei, Saro Meguerdichian, Miodrag Potkonjak:
Gate-level characterization: foundations and hardware security applications. DAC 2010: 222-227 - [c2]Sheng Wei, Miodrag Potkonjak:
Scalable segmentation-based malicious circuitry detection and diagnosis. ICCAD 2010: 483-486
2000 – 2009
- 2006
- [c1]Sheng Wei, Zhong Zhou, Wei Wu:
An Interest Filtering Mechanism Based on LoI. ICAT 2006: 334-343
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint