CESCA Publications are classified into 3 categories: those published since 2011, 2010 and earlier, and theses/dissertations. The featured publications are those published recently and/or representative to the faculty members. Click the underlined title to view the abstract or document.
|New! S. Bhattarai; J. M. Park; B. Gao; K. Bian; W. Lehr, (in press) "An Overview of Dynamic Spectrum Sharing: Ongoing Initiatives, Challenges, and a Roadmap for Future Research," IEEE Transactions on Cognitive Communications and Networking.|
|New! Yuce, B., Ghalaty, N. F., Deshpande, C., Patrick, C., Nazhandali, L. and Schaumont, P. (2016). FAME: Fault-attack Aware Microprocessor Extensions for Hardware Fault Detection and Software Fault Response. Hardware and Architectural Support for Security and Privacy (HASP), Seoul, South Korea. 8 pages.|
|New! C. Dong, Q. Liu and H. Zeng, 2016. "Traffic Assignment with Maximum Delay Constraint in Stochastic Network," 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring), Nanjing, China, pp. 1-5.|
|K. Gent and M. S. Hsiao, "A control path aware metric for grading functional test vectors," 2016 17th Latin-American Test Symposium (LATS), Foz do Iguacu, Brazil, 2016, pp. 51-56.|
|A. Aysu, S. Gaddam, H. Mandadi, C. Pinto, L. Wegryn and P. Schaumont, "A design method for remote integrity checking of complex PCBs," 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), Dresden, Germany, 2016, pp. 1517-1522.|
|Zhao, P., Bian, K., Zhao, T., Song, X., Park, J. M., Li Yi, X., Ye, F. and Yan, W. (in press). Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions, IEEE Transactions on Mobile Computing.|
|Kumar, V., Li, H., Park, J.M.,Bian K. & Yang, Y. (2015) Group Signatures with Probabilistic Revocation: A Computationally-Scalable Approach for Providing Privacy-Preserving Authentication. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 1334-1345.|