C
Chen Liu
Researcher at Shenzhen University
Publications - 168
Citations - 1766
Chen Liu is an academic researcher from Shenzhen University. The author has contributed to research in topics: Energy consumption & Hardware acceleration. The author has an hindex of 15, co-authored 145 publications receiving 957 citations. Previous affiliations of Chen Liu include Guangxi Normal University & Chinese Academy of Sciences.
Papers
More filters
Patent
Flow modeling method
TL;DR: In this article, a flow modeling method for automatic processing of drag operation on a flow chart display zone is presented, where the flow chart is provided with a layout editor, an event monitor and a flow database.
Proceedings ArticleDOI
Auto-tuning multi-programmed workload on the SCC
TL;DR: This paper presents a method that extends auto-tuning to consider the multi-programmed workload across the entire many-core platform of SCC and is able to reduce the energy-delay product of the workload by 58.5%.
Journal ArticleDOI
Integrate multifunctional ionic sieve lithiated X zeolite-ionic liquid electrolyte for solid-state lithium metal batteries with ultralong lifespan
Zhiyu Ding,Qiming Tang,Yanchen Liu,Penghui Yao,Chen Liu,Xingjun Liu,Junwei Wu,Marino Lavorgna +7 more
TL;DR: In this article, an ionic-liquid-X zeolite hybrid is designed as the solid composite electrolyte to settle the above issues, which exhibits a superior ionic conductivity of 3.3×10−4 S·cm−1 and a widened electrochemical window of 5.4
Proceedings ArticleDOI
Hardware-assisted security mechanism: The acceleration of cryptographic operations with low hardware cost
TL;DR: In the past 30 years, more and more information is stored in digitized format due to the rapid development of computer and communication technology, but without good protection scheme, data will be hacked and cracked by the malicious intruders.
Proceedings ArticleDOI
Detecting Data Exploits Using Low-level Hardware Information: A Short Time Series Approach
TL;DR: This study suggests that when the hardware events are monitored at different time spots during the execution of the vulnerable application, the SDA- and ESN-based approaches have the potential to boost the detection accuracy for data exploits.