First name
Lei
Last name
Wang
Gong, R. ., Wang, L. ., Shi, W. ., Liu, W. ., & Zhang, J. . (2022). A Hardware Security Isolation Architecture for Intelligent Accelerator. In (pp. 984–991). http://doi.org/10.1109/TrustCom56396.2022.00135 (Original work published 2024)
Wang, L. ., Xie, S. ., Cao, C. ., & Li, C. . (2022). Research on Security Service Model of Software Defined Network. In (pp. 347–351). Beijing, China: IEEE. http://doi.org/10.1109/ISCSIC57216.2022.00078 (Original work published 2024)
Wang, L. ., Xie, S. ., Cao, C. ., & Li, C. . (2022). Research on Security Service Model of Software Defined Network. In (pp. 347–351). Beijing, China: IEEE. http://doi.org/10.1109/ISCSIC57216.2022.00078 (Original work published 2024)
Zeng, R. ., Lin, Y. ., Li, X. ., Wang, L. ., Yang, J. ., Zhao, D. ., & Su, M. . (2022). Research on the Implementation of Real-Time Intelligent Detection for Illegal Messages Based on Artificial Intelligence Technology. In 2022 11th International Conference on Communications, Circuits and Systems (ICCCAS) (p. 278—284).
Xie, N. ., Gong, Z. ., Tang, Y. ., Wang, L. ., & Wen, Y. . (2022). Protecting White-Box Block Ciphers with Galois/Counter Mode. In 2022 IEEE Conference on Dependable and Secure Computing (DSC) (pp. 1–7).