All Stories

  1. SANTA: A Spatial Accelerator Design for Efficient Number Theoretic Transform (NTT) on Heterogeneous System-on-Chips
  2. Ising Model Processors on a Spatial Computing Architecture
  3. Poster: Address Resolution Protocol Based Attacks for Multi-Robot Systems
  4. An RRAM-Based Computing-in-Memory Architecture and Its Application in Accelerating Transformer Inference
  5. ADLPT: Improving 3D NAND Flash Memory Reliability by Adaptive Lifetime Prediction Techniques
  6. An Approximate Memory Based Defense Against Model Inversion Attacks to Neural Networks
  7. Voltage Over-Scaling-Based Lightweight Authentication for IoT Security
  8. Computation-in-Memory Accelerators for Secure Graph Database: Opportunities and Challenges
  9. Cyber Threat Analysis and Trustworthy Artificial Intelligence
  10. Attack Detection and Countermeasures for Autonomous Navigation
  11. Security of Neural Networks from Hardware Perspective
  12. RIME
  13. Hardware-Based Authentication Applications
  14. MIDAS: Model Inversion Defenses Using an Approximate Memory System
  15. Securing Industrial Control Systems Using Physical Device Fingerprinting
  16. FABLE-DTS: Hardware-Software Co-Design of a Fast and Stable Data Transmission System for FPGAs
  17. Security Challenges of Processing-In-Memory Systems
  18. LPN-based Device Authentication Using Resistive Memory
  19. Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks
  20. Memristors for Secret Sharing-Based Lightweight Authentication
  21. Memristor-Based Security
  22. A Low-Cost GPS Spoofing Detector Design for Internet of Things (IoT) Applications
  23. Hardware-based anti-counterfeiting techniques for safeguarding supply chain integrity
  24. VOLtA: Voltage over-scaling based lightweight authentication for IoT applications
  25. Approximate computing for low power and security in the Internet of Things
  26. Secret Sharing and Multi-user Authentication
  27. Detecting GNSS Spoofing using a Network of Hardware Oscillators
  28. RRAM based lightweight user authentication
  29. A survey on memristor modeling and security applications
  30. Exploring the electronic properties of relaxed bilayer nitrogen-graphene alloy using density functional theory
  31. Performance optimization for terahertz quantum cascade laser at higher temperature using genetic algorithm
  32. Approximation on Data Flow Graph Execution for Energy Efficiency
  33. Voltage Overscaling Techniques for Security Applications
  34. Engaging Underrepresented Students in Cybersecurity using Capture-the-Flag(CTF) Competitions (Experience)