Follow
Ke Jiang
Ke Jiang
Aptiv
Verified email at aptiv.com
Title
Cited by
Cited by
Year
Design optimization for security-and safety-critical distributed real-time applications
W Jiang, P Pop, K Jiang
Microprocessors and Microsystems 52, 401-415, 2017
662017
Design optimization of confidentiality-critical cyber physical systems with fault detection
W Jiang, L Wen, J Zhan, K Jiang
Journal of Systems Architecture 107, 101739, 2020
552020
Co-design techniques for distributed real-time embedded systems with communication security constraints
K Jiang, P Eles, Z Peng
2012 Design, Automation & Test in Europe Conference & Exhibition (DATE), 947-952, 2012
532012
Energy-aware design of stochastic applications with statistical deadline and reliability guarantees
W Jiang, X Pan, K Jiang, L Wen, Q Dong
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2018
472018
Optimized co-scheduling of mixed-precision neural network accelerator for real-time multitasking applications
W Jiang, Z Song, J Zhan, Z He, X Wen, K Jiang
Journal of Systems Architecture 110, 101775, 2020
432020
Optimization of message encryption for distributed embedded systems with real-time constraints
K Jiang, P Eles, Z Peng
14th IEEE International Symposium on Design and Diagnostics of Electronic …, 2011
332011
Energy optimization of security-critical real-time applications with guaranteed security protection
W Jiang, K Jiang, X Zhang, Y Ma
Journal of systems architecture 61 (7), 282-292, 2015
262015
Using spin to model check concurrent algorithms, using a translation from c to promela
K Jiang, B Jonsson
MCC 2009, 67-69, 2009
262009
Optimization of secure embedded systems with dynamic task sets
K Jiang, P Eles, Z Peng
2013 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2013
252013
Design Optimization of Security-Sensitive Mixed-Criticality Real-Time Embedded Systems
X Zhang, J Zhan, W Jiang, Y Ma, K Jiang
1st workshop on Real-Time Mixed Criticality Systems (ReTiMiCS2013), 2013
242013
Robustness analysis of real-time scheduling against differential power analysis attacks
K Jiang, L Batina, P Eles, Z Peng
2014 IEEE Computer Society Annual Symposium on VLSI, 450-455, 2014
202014
Model checking c programs by translating c to promela
K Jiang
202009
Resource allocation of security-critical tasks with statistically guaranteed energy constraint
W Jiang, K Jiang, Y Ma
2012 IEEE International Conference on Embedded and Real-Time Computing …, 2012
162012
Energy-aware design of secure multi-mode real-time embedded systems with FPGA co-processors
K Jiang, A Lifa, P Eles, Z Peng, W Jiang
Proceedings of the 21st International conference on Real-Time Networks and …, 2013
132013
Power-aware design techniques of secure multimode embedded systems
K Jiang, P Eles, Z Peng
ACM Transactions on Embedded Computing Systems (TECS) 15 (1), 1-29, 2016
102016
SPARTA: A scheduling policy for thwarting differential power analysis attacks
K Jiang, P Eles, Z Peng, S Chattopadhyay, L Batina
2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), 667-672, 2016
102016
Energy optimization of security-sensitive mixed-criticality applications for distributed real-time systems
J Zhan, X Zhang, W Jiang, Y Ma, K Jiang
Journal of Parallel and Distributed Computing 117, 115-126, 2018
92018
Detecting fault injection attacks on embedded real-time applications: A system-level perspective
L Wen, W Jiang, K Jiang, X Zhang, X Pan, K Zhou
2015 IEEE 17th international conference on high performance computing and …, 2015
92015
Energy aware real-time scheduling policy with guaranteed security protection
W Jiang, K Jiang, X Zhang, Y Ma
2014 19th Asia and South Pacific Design Automation Conference (ASP-DAC), 317-322, 2014
92014
Work-in-progress: Design of security-critical distributed real-time applications with fault-tolerant constraint
W Jiang, H Hu, J Zhan, K Jiang
2018 International Conference on Embedded Software (EMSOFT), 1-2, 2018
72018
The system can't perform the operation now. Try again later.
Articles 1–20