scispace - formally typeset
C

Chen Liu

Researcher at Shenzhen University

Publications -  168
Citations -  1766

Chen Liu is an academic researcher from Shenzhen University. The author has contributed to research in topics: Energy consumption & Hardware acceleration. The author has an hindex of 15, co-authored 145 publications receiving 957 citations. Previous affiliations of Chen Liu include Guangxi Normal University & Chinese Academy of Sciences.

Papers
More filters
Patent

Flow modeling method

TL;DR: In this article, a flow modeling method for automatic processing of drag operation on a flow chart display zone is presented, where the flow chart is provided with a layout editor, an event monitor and a flow database.
Proceedings ArticleDOI

Auto-tuning multi-programmed workload on the SCC

TL;DR: This paper presents a method that extends auto-tuning to consider the multi-programmed workload across the entire many-core platform of SCC and is able to reduce the energy-delay product of the workload by 58.5%.
Journal ArticleDOI

Integrate multifunctional ionic sieve lithiated X zeolite-ionic liquid electrolyte for solid-state lithium metal batteries with ultralong lifespan

TL;DR: In this article, an ionic-liquid-X zeolite hybrid is designed as the solid composite electrolyte to settle the above issues, which exhibits a superior ionic conductivity of 3.3×10−4 S·cm−1 and a widened electrochemical window of 5.4
Proceedings ArticleDOI

Hardware-assisted security mechanism: The acceleration of cryptographic operations with low hardware cost

TL;DR: In the past 30 years, more and more information is stored in digitized format due to the rapid development of computer and communication technology, but without good protection scheme, data will be hacked and cracked by the malicious intruders.
Proceedings ArticleDOI

Detecting Data Exploits Using Low-level Hardware Information: A Short Time Series Approach

TL;DR: This study suggests that when the hardware events are monitored at different time spots during the execution of the vulnerable application, the SDA- and ESN-based approaches have the potential to boost the detection accuracy for data exploits.