All Stories

  1. ArKANe: Accelerating Kolmogorov-Arnold Networks on Reconfigurable Spatial Architectures
  2. SANTA: A Spatial Accelerator Design for Efficient Number Theoretic Transform (NTT) on Heterogeneous System-on-Chips
  3. Ising Model Processors on a Spatial Computing Architecture
  4. Poster: Address Resolution Protocol Based Attacks for Multi-Robot Systems
  5. An RRAM-Based Computing-in-Memory Architecture and Its Application in Accelerating Transformer Inference
  6. ADLPT: Improving 3D NAND Flash Memory Reliability by Adaptive Lifetime Prediction Techniques
  7. An Approximate Memory Based Defense Against Model Inversion Attacks to Neural Networks
  8. Voltage Over-Scaling-Based Lightweight Authentication for IoT Security
  9. Computation-in-Memory Accelerators for Secure Graph Database: Opportunities and Challenges
  10. Cyber Threat Analysis and Trustworthy Artificial Intelligence
  11. Attack Detection and Countermeasures for Autonomous Navigation
  12. Security of Neural Networks from Hardware Perspective
  13. RIME
  14. Hardware-Based Authentication Applications
  15. MIDAS: Model Inversion Defenses Using an Approximate Memory System
  16. Securing Industrial Control Systems Using Physical Device Fingerprinting
  17. FABLE-DTS: Hardware-Software Co-Design of a Fast and Stable Data Transmission System for FPGAs
  18. Security Challenges of Processing-In-Memory Systems
  19. LPN-based Device Authentication Using Resistive Memory
  20. Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks
  21. Memristors for Secret Sharing-Based Lightweight Authentication
  22. Memristor-Based Security
  23. A Low-Cost GPS Spoofing Detector Design for Internet of Things (IoT) Applications
  24. Hardware-based anti-counterfeiting techniques for safeguarding supply chain integrity
  25. VOLtA: Voltage over-scaling based lightweight authentication for IoT applications
  26. Approximate computing for low power and security in the Internet of Things
  27. Secret Sharing and Multi-user Authentication
  28. Detecting GNSS Spoofing using a Network of Hardware Oscillators
  29. RRAM based lightweight user authentication
  30. A survey on memristor modeling and security applications
  31. Exploring the electronic properties of relaxed bilayer nitrogen-graphene alloy using density functional theory
  32. Performance optimization for terahertz quantum cascade laser at higher temperature using genetic algorithm
  33. Approximation on Data Flow Graph Execution for Energy Efficiency
  34. Voltage Overscaling Techniques for Security Applications
  35. Engaging Underrepresented Students in Cybersecurity using Capture-the-Flag(CTF) Competitions (Experience)