publications
A list of my publications in reverse chronological order.
2024
- Poster: Address Resolution Protocol Based Attacks for Multi-Robot SystemsIn 2024 IEEE International Conference on Mobility: Operations, Services, and Technologies (MOST) , 2024
- Ising Model Processors on a Spatial Computing ArchitectureIn 2024 IEEE 67th International Midwest Symposium on Circuits and Systems (MWSCAS) , 2024
- Attack Detection and Countermeasures at Edge DevicesIn Smart Cyber-Physical Power Systems: Challenges and Solutions , 2024
- An RRAM-Based Computing-in-Memory Architecture and Its Application in Accelerating Transformer InferenceIEEE Transactions on Very Large Scale Integration (VLSI) Systems, Mar 2024
2023
- ADLPT: Improving 3D NAND Flash Memory Reliability by Adaptive Lifetime Prediction TechniquesIEEE Trans. Computers, Mar 2023
2022
- Computation-in-Memory Accelerators for Secure Graph Database: Opportunities and ChallengesIn 27th IEEE/ACM Asia and South Pacific Design Automation Conference (ASP-DAC) , Mar 2022
-
- Approximation on Data Flow Graph Execution for Energy EfficiencyIn Approximate Computing , Mar 2022
- Cyber Threat Analysis using Artificial Intelligence and Machine LearningIn IEEE 6th International Conference on Cryptography, Security and Privacy (CSP 2022) , Mar 2022
- Voltage Over-Scaling-Based Lightweight Authentication for IoT SecurityIEEE Transactions on Computers, Mar 2022
- An Approximate Memory Based Defense Against Model Inversion Attacks to Neural NetworksIEEE Transactions on Emerging Topics in Computing, Mar 2022
2021
- Method to Mitigate Voltage Based Attacks on Key Agreement Over Controller Area Network (CAN)Mar 2021US Patent 10,958,680
- Attack Detection and Countermeasures for Autonomous NavigationIn 2021 55th IEEE Annual Conference on Information Sciences and Systems (CISS) , Mar 2021
- RIME: A Scalable and Energy-Efficient Processing-In-Memory Architecture for Floating-Point OperationsIn 2021 26th IEEE/ACM Asia and South Pacific Design Automation Conference (ASP-DAC) , Mar 2021
- Security of Neural Networks from Hardware Perspective: A Survey and BeyondIn 2021 26th IEEE/ACM Asia and South Pacific Design Automation Conference (ASP-DAC) , Mar 2021
- Hardware-Based Authentication ApplicationsIn Authentication of Embedded Devices , Mar 2021
- Engaging Underrepresented Students in Cybersecurity using Capture-the-Flag(CTF) Competitions (Experience)In 2021 ASEE Virtual Annual Conference Content Access , Jul 2021
2020
- Method to Mitigate Transients Based Attacks on Key Agreement Schemes Over Controller Area NetworkFeb 2020US Patent 10,554,241
- Securing Industrial Control Systems Using Physical Device FingerprintingIn 2020 7th IEEE International Conference on Internet of Things: Systems, Management and Security (IOTSMS) , Feb 2020
- MIDAS: Model Inversion Defenses Using an Approximate Memory SystemIn 2020 IEEE Asian Hardware Oriented Security and Trust Symposium (AsianHOST) , Feb 2020
- Security Challenges of Processing-in-Memory SystemsIn Proceedings of the 2020 ACM Great Lakes Symposium on VLSI (GLSVLSI) , Feb 2020
- FABLE-DTS: Hardware-Software Co-Design of a Fast and Stable Data Transmission System for FPGAsIn 2020 IEEE 33rd International System-on-Chip Conference (SOCC) , Feb 2020
2019
- LPN-based Device Authentication Using Resistive MemoryIn Proceedings of the 2019 ACM Great Lakes Symposium on VLSI (GLSVLSI) , Feb 2019
2018
- Hardware-Based Authentication for the Internet of ThingsUniversity of Maryland, College Park , Feb 2018
- Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area NetworksIn 2018 IEEE Asian Hardware Oriented Security and Trust Symposium (AsianHOST) , Feb 2018
- Memristors for Secret Sharing-Based Lightweight AuthenticationIEEE Transactions on Very Large Scale Integration Systems (TVLSI), Feb 2018
2017
- Hardware-based Anti Counterfeiting Techniques for Safeguarding Supply Chain IntegrityIn 2017 IEEE International Symposium on Circuits and Systems (ISCAS) , Feb 2017
- Memristor-Based SecurityIn Security Opportunities in Nano Devices and Emerging Technologies , Feb 2017
- VOLtA: Voltage Over-Scaling Based Lightweight Authentication for IoT ApplicationsIn 2017 22nd IEEE/ACM Asia and South Pacific Design Automation Conference (ASP-DAC) , Feb 2017
- Approximate Computing for Low Power and Security in the Internet of ThingsIEEE Computer, Feb 2017
- A Low-Cost GPS Spoofing Detector Design for Internet of Things (IoT) ApplicationsIn Proceedings of the 2017 ACM Great Lakes Symposium on VLSI 2017 (GLSVLSI) , Feb 2017
2016
- Detecting GNSS Spoofing using a Network of Hardware OscillatorsIn Proceedings of the 47th Annual Precise Time and Time Interval Systems and Applications Meeting (PTTI) , Feb 2016
- Secret Sharing and Multi-User Authentication: From Visual Cryptography to RRAM CircuitsIn Proceedings of the 26th ACM Great Lakes Symposium on VLSI (GLSVLSI) , Feb 2016
2015
- A Survey on Memristor Modeling and Security ApplicationsIn Sixteenth IEEE International Symposium on Quality Electronic Design (ISQED) , Feb 2015
- RRAM Based Lightweight User AuthenticationIn 2015 IEEE/ACM international conference on Computer-Aided Design (ICCAD) , Feb 2015
2012
- Performance Optimization for Terahertz Quantum Cascade Laser at Higher Temperature Using Genetic AlgorithmOptical and Quantum Electronics, Feb 2012