Return to Skip Menu

Main Content

CESCA Publications: 2011 to present

 

    Go to CESCA Publications: 2010 and earlier page.

This materials are presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders.

Publications are listed by year in reverse chronological order, and by the first author's name in alphabetical order.  Click the underlined title to view the abstract or document.  Type the author's last name or keyword in the Search box to view the relevant publications.

Year
Publication
Keywords
2013 P. Schaumont, “A Practical Introduction to Hardware/ Software Codesign - 2nd Edition,” Springer Circuits and Systems Series, (xviii + 480 pages), ISBN 978-1-4614-3736-9, Springer 2013.  
2013 Z. Chen, A. Sinha, P. Schaumont "Using Virtual Secure Circuit to Protect Embedded Software from Side-Channel Attacks", IEEE Trans. Computers, 62(1): 124-136 (2013). Cryptography, Software, Programming, Power dissipation, Logic gates, Algorithm design and analysis, VSC, Side-channel attacks, dual-rail precharge technique, virtual secure circuit
2012 B. Gao, J. Park, and Y. Yang, "Uplink soft frequency reuse for self-coexistence of cognitive radio networks operating in white-space spectrum," IEEE Annual Int'l Conference on Computer Communications (INFOCOM 2012), March 2012. Games, Interference, Manganese, Nash equilibrium, OFDM, Power demand, Resource management
2012 Kameshwar Chandrasekar, Supratik K. Misra, Sanjay Sengupta, and Michael S. Hsiao, "A scan pattern debugger for partial scan industrial designs," Proceedings of the IEEE Design Automation and Test in Europe Conference & Exhibition (DATE), March 2012. Automatic test pattern generation, Clocks, Debugging, Latches, Logic gates, Silicon, Vectors
2012 M. B. Henry, L. Nazhandali, "Design Techniques for Functional-Unit Power Gating in the Ultra-Low-Voltage Region", 17th Asia and South Pasific Design Automation Conference (ASP-DAC), 2012. Benchmark testing, CMOS integrated circuits, Capacitance, Clocks, Logic gates, Threshold voltage, Transistors
2012 Michael Henry, Leyla Nazhandali, "From Transistors to NEMS: Highly Efficient Power Gating of CMOS Circuits", ACM Journal of Emerging Technologies in Computing Systems (JETC), 8(1), February 2012.  
2012 Min Li and Michael S. Hsiao, "RAG: An efficient reliability analysis of logic circuits on graphics processing units," Proceedings of the IEEE Design Automation and Test in Europe Conference (DATE), March 2012, 316-319. Circuit faults, Computational modeling, Graphics processing unit, Integrated circuit modeling, Integrated circuit reliability, Logic gates
2012 N. Kong and D.S. Ha (2012). “Low-Power Design of a Self-powered Piezoelectric Energy Harvesting System with Maximum Power Point Tracking,” IEEE Transactions on Power Electronics, 27(5): 2298-2308. Impedance matching, piezoelectric transducers, power conditioning, power conversion, pulse frequency modulation
2012 P. L. Fanto, J. C. Gassaway, K. B. Kochersberger, and A. L. Abbott, "3D Mapping Techniques using a Stereo Boom on Low-Flying Vehicles," Proceedings: ASPRS 2012 Annual Conference, Sacremento, CA, March 2012, pp.40.  
2012 S. Ahuja, A. Lakshminarayana, and S. K. Shukla, "Low Power Design with High-Level Power Estimation and Power-Aware Synthesis", Springer, Boston, MA, 2012, Pages. 170, Hardbound, ISBN: 978-1-4614-0871-0  
2012 Sarvesh Prabhu, Michael S. Hsiao, Loganathan Lingappan and Vijay Gangaram, "A novel SMT-based technique for LFSR reseeding," Proceedings of the IEEE VLSI Design Conference, January 2012, 394-399. LBIST, LFSR-reseeding, SMT
2012 Sarvesh Prabhu, Michael S. Hsiao, Loganathan Lingappan and Vijay Gangaram, "A SMT-based diagnostic test generation method for combinational circuits," Proceedings of the IEEE VLSI Test Symposium, April 2012, 215-220. Satisfiability Modulo theory(SMT), diagnostic test pattern generation, fault distinguishing
2012 A. Maiti, I. Kim and P. Schaumont, "A Robust Physical Unclonable Function with Enhanced Challenge-Response Set," IEEE Transactions on Information Forensics and Security, 7(1):333-345, February 2012. Physical unclonable function (PUF) , challenge-response pair (CRP) , entropy , identity mapping , ring oscillator 
2012 A. Maiti, P. Schaumont, "A Novel Microprocessor-intrinsic Physical Unclonable Function," International Conference on Field Programmable Logic and Applications (FPL 2012), August 2012.  Authentication, Clocks, Delay, Field programmable gate arrays, Hardware, Microprocessors, Pipelines 
2012 A. Maiti, V. Gunreddy, P. Schaumont, "A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions," Chapter 11 in "Embedded System Design with FPGAs," Eds. P. Athanas, D. Pnevmatikatos, N. Sklavos, Springer 2012, ISBN 978-1-4614-1361-5  
2012 B. Bahrak, A. Deshpande, and J. Park, "Spectrum access policy reasoning for policy-based cognitive radios," Elsevier Computer Networks, 56(11), 2649-2663. Spectrum access policy, cognitive radio, policy reasoner, binary decision diagram, policy algebra, Boolean function manipulation
2012 E. Prouff, P. Schaumont (Eds.),"Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop", Leuven, Belgium, September 9-12, 2012. Proceedings. Lecture Notes in Computer Science 7428, Springer 2012, ISBN 978-3-642-33026-1.  
2012 Hua Lin, Santhosh Veda, Sandeep Shukla, Lamine Mili, and James Thorp, 2012, "GECO: Global Event-Driven Co-Simulation Framework for Interconnected Power System and Communication Network", IEEE Transactions on Smart Grid, 3(3), 1444-1456. Co-simulation, event-driven, wide area protection and control
2012 Hua Lin, Santosh Sambamoorthy, Sandeep Shukla, James Thorp, Lamine Mili, "A Study of Communication and Power System Infrastructure Interdependence on PMU-based Wide Area Monitoring and Protection", IEEE Power and Energy Society General Meeting, July 2012, Co-Simulation, Interdependence , Out-of-Step, WAMS
2012 J. H. Reed, J. T. Bernhard, and J. Park, “Spectrum Access Technologies: The Past, the Present, and the Future,” Proceedings of the IEEE, Vol. 100, Special Centennial Issue, May 2012, pp. 1676–1684. Cognitive radio, dynamic spectrum access, spectrum access, spectrum coexistence, spectrum sharing
2012 J. Zhang, S. Iyer, P. Schaumont, Y. Yang, (2012), "Simulating Power/Energy Consumption of Sensor Nodes with Flexible Hardware in Wireless Networks," 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 18-21 June 2012, Seoul, Korea. Current measurement, Energy consumption, Field programmable gate arrays, Hardware, Microcontrollers, Power demand, Wireless sensor networks
2013 K. Bian and J. Park, "Maximizing rendezvous diversity in rendezvous protocols for decentralized cognitive radio networks," IEEE Transactions on Mobile Computing, vol. 12, no. 7, July 2013, pp. 1294–1307. Synchronization,Protocols,Receivers,Arrays,Materials requirements planning,Mobile computing,Indexes,asynchronous channel hopping,Cognitive radio,maximum rendezvous diversity
2012 L. Judge, M. Cantrell, C. Kendir, P. Schaumont, "A Modular Testing Environment for Implementation Attacks," Workshop on Redefining and Integrating Security Engineering at ASE/IEEE International Conference on Cyber Security 12 (RISE), December 2012.  Side-channel analysis, differential power analysis (DPA), Timing analysis, Differential fault analysis (DFA), Security testing
2012 L. Judge, P. Schaumont, (2012), “A Flexible ECDLP Engine in Bluespec,” Special-purpose Hardware for Attacking Cryptographic Systems (SHARCS 2012), (20 pages), Washington DC, March 2012.  
2012 L. Judge, S.Mane, P. Schaumont, "A Hardware Accelerated ECDLP with High-performance Modular Multiplication," International Journal of Reconfigurable Computing (IJRC), Hindawi Publishers, September 2012.  
2012 M. B. Henry, Leyla Nazhandali, "Hybrid Super/Subthreshold Design of a Low Power Scalable-Throughput FFT Architecture," Transactions on HiPEAC: Volume 4, Issue 2, pgs. 175-194.  
2012 M. Srivastav, M. Henry, L. Nazhandali "Design of low-power, scalable-throughput systems at near/sub threshold voltage," Thirteenth International Symposium on Quality Electronic Design, ISQED 2012, Santa Clara, CA, USA, March 19-21, 2012 Algorithm design and analysis, Analytical models, Delay, Digital signal processing, Heuristic algorithms, Throughput, Transistors
2013 M. Srivastav, X. Guo, S. Huang, D. Ganta, M. B. Henry, L. Nazhandali, and P. Schaumont, "Design and Benchmarking of an ASIC with Five SHA-3 Finalist Candidates," Elsevier Microprocessors and Microsystems - Embedded Hardware Design (Special Issue on "Digital System Security and Safety"), Volume 37, Issue 2, Pages 246-257, March 2013. Application specific integrated circuit (ASIC); Field programmable gate array (FPGA); Hash algorithm (HASH); SHA-3 competition
2012 M. Taha, P. Schaumont, "A Novel Profiled Attack in the Presence of High Algorithmic Noise," International Conference on Computer Design (ICCD 2012), September 2012. Aggregates, Algorithm design and analysis, Hamming distance, Indexes, Noise, Power demand, Registers
2012 M.B. Henry and L. Nazhandali  “NEMS-based Functional Unit Power-Gating: Design, Analysis, and Optimization”, Accepted to IEEE Transactions on Circuits and System I Low power electronics, micromechanical devices, nanoelectromechanical systems
2012 Mahesh Nanjundappa, Julien Ouy, Sandeep Shukla, "Synthesizing Embedded Software with Safety Wrappers through Polyhedral Analysis in a Polychronous Framework", IEEE/ECSI Symposium on ESL synthesis (ESLSyn 2012), San Francisco, June 2012, pp. 24-29. Abstracts, Analytical models, Clocks, Computational modeling, Libraries, Safety, Synchronization
2012 Matthew Anderson, Sandeep Shukla, “An Executable Formal Model of an AUTOSAR Platform with Polychrony”, System Level Design of Automotive Electronics, San Francisco, June, 2012.  
2012 N. J. Short, A. L. Abbott, M. S. Hsiao, and E. A. Fox, “Reducing Descriptor Measurement Error through Bayesian Estimation of Fingerprint Minutia Location and Direction,” IET Biometrics, March 2012, pp. 82-90.  
2012 S. Mane, M. Taha, P. Schaumont, "Efficient and Side-Channel-Secure Block Cipher Implementation with Custom Instructions on FPGA," International Conference on Field Programmable Logic and Applications (FPL 2012), August 2012. Field programmable gate arrays, Resistance, SDRAM
2012 Shravan Garlapati, and Sandeep Shukla, “Optimum Location of Master Agents in an Agent Based Zone 3 Protection Scheme Designed for Robustness Against Hidden Failure Induced Trips to the  Submission Site”, IEEE Power and Energy Society General Meeting, July 2012, pp.1-7. IEEE C37.118, agents, distance relays, hidden failure, multiple facility location
2012 Shravan Garlapati, Sandeep Shukla, “Formal Verification of Hierarchically Distributed Agent Based Protection Scheme in Smart Grid” SPIN Workshop, 2012, Oxford, UK, July 2012.  
2012 Soumyo Chakraborty, Sandeep Shukla and Jim Thorp, "A Detailed Analysis of the Effective-Load-Carrying-Capacity Behavior of Plug-in Electric Vehicles in the Power Grid", Innovative Smart Grid Technologies (ISGT), 2012 IEEE PES ISGT Conference, Washington, DC. Effective Load Carrying Capacity (ELCC), Plug-in Electric Vehicles (PEV), Vehicle-to-Grid (V2G)
2012 Soumyo Chakraborty, Sandeep Shukla and Jim Thorp, “Computing Optimal Solar Penetration in the Presence of Plug-in Electric Vehicles", IEEE EnergyTech 2012, Cleveland, Ohio, 2012. effective load carrying capacity (ELCC), plug-in electric vehicles (PEV), solar generators, vehicle to grid (V2G)
2012 Soumyo Chakraborty, Sandeep Shukla and Jim Thorp, “System Imbalance Minimizing Renewable Generation Portfolio Selection in the Presence of Plug-in Electric Vehicles”, IEEE PES General Meeting, July 2012 grid-to-vehicle (G2V), plug-in electric vehicle (PEV), power system stability, renewable portfolio optimization, solar energy, system imbalance reserve, vehicle-to-grid (V2G), wind energy
2012 V. Kahlon and C. Wang. "Lock removal for concurrent trace programs" International Conference on Computer Aided Verification (CAV'12). Berkeley, CA. July 2012.  
2012 X. Guo, M. Srivistav, S. Huang, D. Ganta, M. B. Henry, L. Nazhandali, and P. Schaumont, (2012), "ASIC Implementations of Five SHA-3 Finalists," Design, Automation and Test in Europe (DATE2012), 1006-1011, March 2012.  
2012 Yi Deng, Hua Lin, Sandeep Shukla, Jim Thorp, Lamine Mili, "Communication Network Modeling and Simulation for Wide Area Measurement Applications", 2012 IEEE PES Conference on Innovative Smart Grid Technologies, pp.1-6, Washington DC, 16-20 January 2012. Delay , Monitoring, Phasor measurement units, Protocols, Relays, Routing, Substations
2012 Yi. Deng, Hua Lin, Arun Phadke, Sandeep Shukla, and Jim Thorp, "Networking Technologies for Wide Area Measurement Applications", book chapter in Smart Grid Communications and Networking, Cambridge University Press, UK, Edited By Ekram Hossain, Zhu Han, H.  
2011 Fang Yu and Chao Wang (Editors) “Proceedings 13th International Workshop on Verification of Infinite-State System,” in EPTCS 73 2011.  
2011 Hua Lin, Santhoshkumar Sambamoorthy, Sandeep Shukla, James Thorp, Lamine Mili,  "Ad-Hoc vs. Supervisory Wide Area Backup Relay Protection Validated On Power/Network Co-Simulation Platform", Proceedings of 17th Power Systems Computation Conference (PSCC), August, 2011, Stockholm, Sweden. Backup relay protection, Network infrastructure, Software agents, Co-simulation
2011 M. Ganai, N. Arora, C. Wang, A. Gupta and G. Balakrishnan. “BEST: A symbolic testing tool for predicting multi-threaded program failures,” in Proc. IEEE/ACM Intl. Conf. Automated Software Engineering, Lawrence, KS, USA, November 2011.  
2011 Soumyo V. Chakraborty, Sandeep K. Shukla, James Thorp, "Optimizing Grid Contribution and Economic Returns from Solar Generators by Managing the Output Uncertainty Risk",  PowerTech, 2011 IEEE Trondheim, pp.1-7, Trondheim, Norway, June 2011 forecasting , power grids, power system economics, power system reliability, risk analysis, smart grids, solar power generation
2011 Yi Deng, S. Garlapati, Hua Lin, S. Sambamoorthy, S. Shukla, J. Thorp and L. Mili,  "Visual Integrated Application Development for Substation Automation Compliant to IEC 61850", Proceedings of 2011 PAC World Conference, June, 2011, Dublin, Ireland.  
2011 A. Maiti, L. McDougall and P. Schaumont, "The Impact of Aging on An FPGA-Based Physical Unclonable Function," 21st International Conference on Field Programmable Logic and Applications (FPL 2011), September 2011. Best Paper Award. FPGA, Physical Unclonable Function, aging
2011 A. Maiti, P. Schaumont, "Improved Ring Oscillator PUF: An FPGA-Friendly Secure Primitive," IACR Journal of Cryptology, special issue on Secure Hardware, 24(2), April 2011, Springer. Ring oscillator, Physical unclonable function, Challenge–response, Process variations (PV), Systematic process variation, Uniqueness, Reliability
2011 A. Maiti, V. Gunreddy, P. Schaumont, "A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions", IACR ePrint 2011/657, November 2011. Physical Unclonable Function, Challenge, Response, Ring, Oscillator, Arbiter, Parameter, Performance
2011 A. Sinha, S. Malik, C. Wang and A. Gupta. "Predictive Analysis for Detecting Serializability Violations through Trace Segmentation," ACM/IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE'11). Cambridge, UK. July 2011. Image edge detection, Indexes, Instruction sets, Java, Predictive models, Synchronization, Systematics
2011 B. Gao, Y. Yang, and J. Park, "Channel aggregation in cognitive radio networks with practical considerations," IEEE International Conference on Communications (ICC 2011), Kyoto, Japan, June, 2011. Availability, Bandwidth, Cognitive radio, Delay, Numerical models, Sensors, Switches
2011 Bijoy A. Jose, Abdoulaye Gamatie, Julien Ouy and Sandeep K. Shukla, "SMT Based False Causal loop Detection during Code Synthesis from Polychronous Specifications", Proceedings of ACM/IEEE International Conference on Methods and Models for Co-Design (MEMOCODE '11), Cambridge, UK, July 2011, pp. 109-108, IEEE Computer Society Press. Buffer storage, Clocks, Computational modeling, Equations, Mathematical model, Program processors, Synchronization
2011 C. Wang, M. Said and A. Gupta. "Coverage guided systematic concurrency testing," International Conference on Software Engineering (ICSE '11). Honolulu, Hawaii. May 2011.  
2011 Chuan Han and Yaling Yang, "Information Propagation Speed Study in Multihop Cognitive Radio Networks", IEEE Infocom 2011 Miniconference. Analytical models, Delay, Numerical models, Radio transmitters, Receivers, Relays, Sensors
2011 Chuan Han and Yaling Yang, "Compatibility between Three Well-known Broadcast Tree Construction Algorithms and Various Metrics", IEEE Transactions on Mobile Computing, vol.10, no.8, pp.1187-1199, Aug. 2011. Broadcast routing, routing metric design, routing protocols
2011 D. Ganta, V. Vivekraja, K. Priya, L. Nazhandali, "A Highly Stable Leakage-Based Silicon Physical Unclonabble Function", 24th International Conference on VLSI Design (VLSI Design), Chennai, India, Jan 2011, pgs. 135-140. Circuit stability, Integrated circuits, Leakage current, Sensors, Silicon, Thermal stability, Transistors
2011 Harini Jagadeesan and Michael S. Hsiao, "Continuous Authentication in Computers," book chapter in Continuous Authentication Using Biometrics: Data, Models, and Metrics, edited by Issa Traore and Ahmed Awad E. Ahmed, IGI Global, pp. 40-66, September 2011.  
2011 Hua Lin; Sambamoorthy, Santhoshkumar; Shukla, Sandeep; Thorp, James; Mili, Lamine; "Power system and communication network co-simulation for smart grid applications," Innovative Smart Grid Technologies (ISGT), 2011 IEEE PES, Anaheim, CA., pp.1-6, 17-19 Jan. 2011. Co-Simulation, Remote Backup Relay, Smart Grid
2011 J. Jeong, J.K. Kim, D.S. Ha, and H-S Lee, “A Reliable Ultra Low Power Merged LNA and Mixer Design for Medical Implant Communication Services,” IEEE-NIH Life Science Systems and Application Workshop (LiSSA’11), pp.51-54, April 2011. CMOS RF, LNA, MICS, low power, mixer, sub-threshold, weak inversion
2011 J. Park and K. Bian, "Security of Cognitive Radios," in Encyclopedia of Cryptography and Security, Second Edition, Henk C. A. van Tilborg and Sushil Jajodia (Eds.), Springer, 2011.  
2011 J. Turner, J. Cartwright, D.S. Ha, D. Zhang, and S. Banerjee, “On Energy Harvesting Module for Scalable Cognitive Autonomous Nondestructive Sensing Network (SCANSn) System for Bridge Health Monitoring,” SPIE International Symposium on Smart Structures and Homeland Security 2011.  
2011 J. Yun, D.S. Ha, D.J. Inman, and R. Owen, “Adverse Event Detection (AED) System for Continuously Monitoring and Evaluating Structural Health Status,” SPIE International Symposium on Smart Structures and Materials & Nondestructive Evaluation and Health Monitoring, Vol. 7977, 79771-R1 (11 pages), March 2011.  
2011 J. Zhang, Y. Tang, S. Hirve, S. Iyer, P. Schaumont, Y. Yang, "A Software-Hardware Emulator for Sensor Networks," 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), June 2011. Best Paper Award. Clocks, Computer architecture, Data models, Hardware, Microcontrollers, Software, Wireless sensor networks
2011 J.K. Kim, J. Jeong, D.S. Ha, and H-S Lee, “A Current-Reuse Quadrature VCO for Wireless Body Area Networks,” IEEE-NIH Life Science Systems and Application Workshop (LiSSA’11), pp. 55-58, April 2011. Current-reuse VCO, MICS, P-QVCO, QVCO
2011 J.K. Kim, J. Jeong, D.S. Ha, and H-S Lee, “Low-Power Quadrature VCO Design for Medical Implant Communication Service,” IEEE Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), pp. 403-404, April 2011. Current-reuse VCO, MICS, P-QVCO, QVCO
2011 Jens Brandt, Mike Gemuend, Klaus Schneider, Sandeep Shukla, and Jean-Pierre Talpin, "Integrating System Descriptions by Clocked Guarded Actions", Proceedings of International Forum on Design Languages (FDL'11), September 2011, Oldenburg, Germany. Clocks, Computational modeling, Delay, Integrated circuit modeling, Mathematical model, Semantics, Synchronization
2011 K. Bian and J. Park, "Asynchronous channel hopping for establishing rendezvous in cognitive radio networks," 2011 IEEE INFOCOM Mini-Conference, Apr. 2011. Arrays, Clocks , Indexes, Protocols, Radio transmitters, Receivers, Synchronization
2011 K. Bian, J. Park, and R. Chen, "Control channel establishment in cognitive radio networks using channel hopping," IEEE Journal on Selected Areas in Communications, Vol. 29, No. 4, April, 2011. Control channel, channel hopping, cognitive radio, medium access control, quorum system
2011 K. E. Hoyle, N. J. Short, M. S. Hsiao, A. L. Abbott, and E. A. Fox, "Minutiae + Friction Ridges = Triplet-Based Features for Determining Sufficiency in Fingerprints," Proceedings of the 4th International Conference on Imaging for Crime Detection and Prevention (ICDP-11), London, UK, Nov. 2011. Biometrics, Data Mining, Fingerprint, Latent
2011 K. V. Stefanik, J. C. Gassaway, K. B. Kochersberger, and A. L. Abbott, "UAV-based Stereo Vision for Rapid Aerial Terrain Mapping," GIScience & Remote Sensing, vol. 48, no. 1, 2011, pp. 24-49. Computer Science, Earth and Planetary Science, GIS and Remote Sensing, Geography, Environment and Information Storage and Retrieval
2011 K. Zeng, J. Yun, D.S. Ha, and D.J. Inman, “Wireless Low-Power Structural Health Monitoring System for Wind Turbine Blades,” 2011 World Congress on Advances in Structural Engineering and Mechanics (ASEM11+), pp. 3612-3621, September 2011.  
2011 Lakshminarayana, Avinash; Ahuja, Sumit; Shukla, Sandeep;, "High Level Power Estimation Models for FPGAs," VLSI (ISVLSI), 2011 IEEE Computer Society Annual Symposium on, Chennai, India, pp.7-12, 4-6 July 2011. Dynamic power estimation, FPGA power models, Linear Regression, Power modeling
2011 L-T Wang, N. A. Touba, M. S. Hsiao, J-L Huang, J. C-M Li, S. Wu, X. Wen, M. Bhattaraie, F. Li, and Z. Jiang, "Architectures for testing 3D chips using time-division demultiplexing/multiplexing," Proceedings of the IEEE International Workshop on Testing Three-Dimensional Stacked Integrated Circuits, September 2011.  
2011 Lei Fang and Michael S. Hsiao, "A Fast Approximation Algorithm for MIN-ONE SAT and Its Application on MAX-SAT Solving," book chapter in Advanced Techniques in Logic Synthesis, Optimizations and Applications, edited by Sunil P. Khatri and Kanupriya Gulati, Springer, pp. 149-170, 2011. Circuits and Systems, Computer-Aided Engineering (CAD, CAE) and Design
2011 M. B. Henry, M. Srivastav, L. Nazhandali, "A Case for NEMS-Based Functional-Unit Power Gating of Low-Power Embedded Microprocessors", 48th ACM/EDAC/IEEE Design Automation Conference (DAC), San Diego, CA, June 2011, pgs. 872-877. Functional Units, Low Power, NEMS, Power Gating
2011 M. Henry, R. Lyerly, L. Nazhandali, A. Fruehling, D. Peroulis, "MEMS-Based Power Gating for Highly Scalable Periodic and Event-Driven Processing", 24th International Conference on VLSI Design (VLSI Design), Chennai, India, Jan 2011, pgs. 286-291. CMOS integrated circuits, Contacts, Logic gates, Micromechanical devices, Microswitches, Program processors, Threshold voltage
2011 M. Said, C. Wang, K. Sakallah and Z. Yang. "Generating data race witnesses by an SMT-based analysis," NASA Formal Methods Symposium (NFM'11). Pasadena, CA. April 2011. Data race, Debug, SMT, Concurrent Programs
2011 Maheshwar Chandrasekar and Michael S. Hsiao, "A novel learning framework for state space exploration based on search state extensibility relation," in Proceedings of the IEEE VLSI Design Conference, January 2011, pp. 64-69. Boolean functions, Computational modeling, Data structures, Decision trees, Logic gates, Monitoring, Space exploration
2011 Maheshwar Chandrasekar and Michael S. Hsiao, "Fault collapsing using a novel extensibility relation," in Proceedings of the IEEE VLSI Design Conference, January 2011, pp. 268-273. Automatic test pattern generation, Benchmark testing, Circuit faults, Engines, Fault diagnosis, Fires, Logic gates
2011 Mainak Banga and Michael S. Hsiao, "Design-for-test methodology for non-scan at-speed testing," in Proceedings of the IEEE Design Automation and Test in Europe Conference (DATE), March 2011. Automatic test pattern generation, Circuit faults, Discrete Fourier transforms, Logic gates, Observability, Pins
2011 Mainak Banga and Michael S. Hsiao, "ODETTE: A Non-Scan Design-for-Test Methodology for Trojan Detection in ICs," in Proceedings of the IEEE Hardware-Oriented Security and Trust Symposium, June 2011, pp. 18-23. Delay, Integrated circuits, Logic gates, Multiplexing, Pins, Trojan horses
2011 Min Li and Michael S. Hsiao, "High-performance diagnostic fault simulation on GPUs," Proceedings of the IEEE European Test Symposium (ETS), May 2011. compute unified device architecture (CUDA), diagnostic faut simulation, general-purpose computing on graphics processing unit (GPGPU), parallel algorithm
2011 Min Li and Michael S. Hsiao, "3-D parallel fault simulation with GPGPU," in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 30, no. 10, October, 2011, pp. 1545-1555. Compute unified device architecture (CUDA), fault simulation, general purpose computation on graphics processing unit (GPGPU), parallel algorithm, single-instruction multiple threads (SIMT)
2011 Min Li, Kelson Gent and Michael S. Hsiao, "Utilizing GPGPUs for design validation with a modified ant colony optimization," Proceedings of the IEEE High Level Design Validation and Test Workshop (HLDVT), November 2011. Ant Colony Optimization, Compute Unified Device Architecture (CUDA), Design Validation, General Purpose Computation on Graphics Processing Unit (GPGPU), Single Instruction Multiple Threads (SIMT)
2011 N. J. Short, A. L. Abbott, M. S. Hsiao, and E. A. Fox, "A Bayesian Approach to Fingerprint Minutia Localization and Quality Assessment using Adaptable Templates," Proceedings of the International Joint Conference on Biometrics (IJCB 2011), Arlington, VA, Oct. 2011. Reliability
2011 N. J. Short, A. L. Abbott, M. S. Hsiao, and E. A. Fox, "Latent Fingerprint Segmentation using Ridge Template Correlation," Proceedings of the 4th International Conference on Imaging for Crime Detection and Prevention (ICDP-11), London, UK, Nov. 2011. Biometrics, Fingerprint, Latent, Quality, Segmentation
2011 N. Kong, T.S. Deyerle, and D.S. Ha, “Universal Power Management IC for Small-Scale Energy Harvesting with Adaptive Impedance Matching,” Energy Conversion Congress and Exposition (ECCE), pp. 3859–3863, September 2011. DC-DC converter, energy harvesting, impedance matching, power management
2011 N. Sinha and C. Wang. "On interference abstraction," ACM Symposium on Principles of Programming Languages (POPL'11), pages 423-434. Austin, TX. January 2011.  
2011 P. Schaumont, Z. Chen, "Side-channel Attacks and Countermeasures for Embedded Microcontrollers," in Introduction to Hardware Security and Trust, Eds M. Tehranipoor, C. Wang, 263-282, Springer. Circuits and systems, Electronics and microelectronics instrumentation, processor architectures
2011 R. Thirugnanam and D.S. Ha, "Feasibility Study for Communication over Power Distribution Networks of Microprocessors,” IEEE International SOC Conference (SOCC), pp. 118-121, September 2011. Debug, Design-for-testability, Microprocessor, Power distribution network, Power line communication, Testing, Ultra wideband
2011 S. H. Park, J. P. Leidig, L. T. Li, E. A. Fox, N. J. Short, K. E. Hoyle, A. L. Abbott, and M. S. Hsiao, "Experiment and Analysis Services in a Fingerprint Digital Library for Collaborative Research," Proceedings: International Conference on Theory and Practice of Digital Libraries (TPDL 2011), Berlin, Sept. 2011. Also in Lecture Notes in Computer Science (LNCS), vol. 6966, Research and Advanced Technology for Digital Libraries, pp. 179-191, 2011. Fingerprint collections, algorithms, experiments, analyses
2011 S. Iyer, J. Zhang, Y. Yang, and P. Schaumont, "A Unifying Interface Abstraction for Accelerated Computing in Sensor Nodes," 2011 Electronic System Level Synthesis Conference (ESLSyn), San Diego, June 2011. Computer architecture, Field programmable gate arrays, Hardware, Kernel, Program processors, Synchronization
2011 S. Mane, L. Judge, P. Schaumont, "An Integrated Prime-field ECDLP Hardware Accelerator with High-performance Modular Arithmetic Units," 2011 International Conference on Reconfigurable Computing and FPGAs (RECONFIG), December 2011. Elliptic curve discrete logarithmic algorithm (ECDLP), FPGA, Hardware software co-design, Pollard rho, Prime field arithmetic
2011 S. Morozov, C. Tergino, P. Schaumont, "System Integration of Elliptic Curve Cryptography on an OMAP Platform," 9th IEEE Symposium on Application Specific Processors (SASP), June 2011. Algorithm design and analysis, Digital signal processing, Elliptic curve cryptography, Libraries, Polynomials, VLIW
2011 S. Wang, D.S. Ha, B. Kim, and V. Chawla, “A Combined VCO and Divide-by-Two for Low-Voltage Low-Power 1.6 GHz Quadrature Signal Generation,” IEEE Custom Integrated Circuits Conference (CICC), (4 pages), September 2011. VCO, divide-by-two, local oscillator (LO), quadrature signal generation
2011 Sandesh Prabhakar, Rajamani Sethuram, and Michael S. Hsiao, "Trace buffer-based silicon debug with lossless compression," in Proceedings of the IEEE VLSI Design Conference, January 2011, pp. 358-363. Benchmark testing, Entropy, Flip-flops, Hardware, Real time systems, Silicon, Transforms
2011 Saparya Krishnamoorthy, Michael S. Hsiao, and Loganathan Lingappan, "Strategies for scalable symbolic execution-driven test generation for programs," in Science China Information Sciences, vol. 54, no. 9, pp. 1797-1812, 2011. Test generation, Software testing, Symbolic execution, Path explosion, Conflict analysis
2011 S. Prabhu, M. S. Hsiao, S. Krishnamoorthy, L. Lingappan, V. Gangaram and J. Grundy, "An efficient 2-phase strategy to achieve high branch coverage," Proceedings of the IEEE Asian Test Symposium (ATS), November 2011. branch coverage, conflict-driven learning, software testing, symbolic execution
2011 Shianling Wu, Laung-Terng Wang, Xiaoqing Wen, Zhigang Jiang, Lang Tan, Yu Zhang, Yu Hu, Wen-Ben Jone, Michael S. Hsiao, James Chien-Mo Li, Jiun-Lang Huang, and Lizhen Yu, "Using launch-on-capture for testing scan designs containing synchronous and asynchronous clock domains," in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 30, no. 3, March, 2011, pp. 455-463. Aligned launch-on-capture, at-speed scan testing, double-capture, hybrid launch-on-capture, launch-on-capture, one-hot launch-on-capture, staggered launch-on-capture
2011 Soumyo V. Chakraborty, Sandeep K. Shukla, James Thorp, "A Framework For Analyzing Load-Carrying-Capacity Of Plug-In Electric Vehicles And Impact On Solar Generators", in the proceedings of the 2011 IASTED European Conference on Power and Energy Systems, Crete, Greece, June 2011. Plug-in Electric Vehicles (PEV), Vehicle-to-Grid (V2G), Renewable Generation, Solar Energy, Effective load carrying capacity
2011 T.L. Cochran, J.K. Kim, and D.S. Ha, “Low Power Wake-Up Receiver with Unique Node Addressing,” IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), (4 pages), August 2011. CMOS integrated circuits , CMOS technology , Fuses
2011 Ting Wang and Yaling Yang, "Location Privacy Protection from RSS Localization System Using Antenna Pattern Synthesis", Proceedings IEEE INFOCOM 2011. Antenna measurements, Antenna radiation patterns, Estimation, Mobile antennas, Mobile communication, Privacy, Wireless LAN
2011 V. Chawla and D.S. Ha, “Dual Use of Power Lines for Data Communications in Microprocessors,” IEEE Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), pp. 23-28, April 2011. CMOS, Impulse-UWB Receiver, Microprocessors, Power Line Communication
2011 V. Vivekraja, L. Nazhandali, "Feedback Based Supply voltage Control for Temperature Variation Tolerant PUFs", 24th International Conference on VLSI Design (VLSI Design), Chennai, India, Jan 2011, pgs. 214-219. Circuit stability, Ring oscillators, Stability analysis, Temperature sensors, Thermal stability, Voltage control
2011 Wei Hu, Huy Nguyen, and Michael S. Hsiao, "Sufficiency-based filtering of invariants for sequential equivalence checking," Proceedings of the IEEE High Level Design Validation and Test Workshop (HLDVT), November 2011. Inductive Invariants , Sequential Equivalence Checking , Sufficiency-based Filter
2011 X. Guo, M. Srivastav, S. Huang, D. Ganta, M. Henry, L. Nazhandali, P. Schaumont, "Silicon Implementation of SHA-3 Finalists: BLAKE, Groestl, JH, Keccak and Skein," ECRYPT II Hash Workshop 2011, Tallinn, Estonia, May 2011.  
2011 X. Guo, M. Srivistav, S. Huang, D. Ganta, M. Henry, L. Nazhandali, and P. Schaumont, "Pre-silicon Characterization of NIST SHA-3 Final Round Candidates", 14th Euromicro Conference on Digital System Design Architectures, Methods and Tools (DSD 2011), August 2011. ASIC, Hardware Evaluation, Methodology, SHA-3
2011 X. Guo, P. Schaumont, "The Technology Dependence of Lightweight Hash Implementation Cost", Ecrypt II 2011 Workshop on Lightweight Cryptography, November 2011, pgs 236-254.  
2011 Y. Shim, S. Yuwono, S.-J. Kim, J.-M. Kim, S.-K. Han, S.-G. Lee, and D.S. Ha, “A 520 pJ/pulse IR-UWB Radar for Short Range Object Detection,” IEEE Radio Frequency Integrated Circuits (RFIC) Symposium, RMO2A-4 (4 pages), June 2011. Radar detection, correlator, interference suppression, low noise amplifier, pulse generation
2011 Yaling Yang, Yujun Li, Mengshu Hou, "Many-to-One Deliverability of Greedy Routing in 2-D Wireless Sensor Networks", Proceedings of IEEE Infocom 2011. USA Councils
2011 Z. Chen, P. Schaumont, "A Parallel Implementation of Montgomery Multiplication on Multi-core Systems: Algorithm, Analysis, and Prototype," IEEE Transactions on Computers, 60(12):1692-1703, December 2011. Montgomery multiplication, parallel programming, public-key cryptography, tiled processor
2011 Z. Chen, X. Guo, A. Sinha, and P. Schaumont, "Data-Oriented Performance Analysis of SHA-3 Candidates on FPGA Accelerated Computers," Design, Automation and Test in Europe (DATE2011), March 2011. Bandwidth, Benchmark testing, Buffer storage, Computer architecture, Field programmable gate arrays, Hardware, Software
2013 D. Bakshi and M. S. Hsiao, "LFSR seed computation and reduction using SMT-based fault-chaining," Proceedings of the IEEE Design Automation and Test in Europe (DATE) Conference, March, 2013. LFSR Reseeding, Logic BIST, Test generation, Satisfiability Modulo Theories 
2013 M. El-bayoumi, M. S. Hsiao and M. ElNainay, "A novel concurrent cache-friendly binary decision diagram construction for multi-core platforms," Proceedings of the IEEE Design Automation and Test in Europe (DATE) Conference, March, 2013.  
2013 A. Desai, M. S. Hsiao, C. Wang, L. Nazhandali, and S. Hall, "Interlocking obfuscation for anti-tamper hardware," Cyber Security and Information Intelligence Research Workshop, Jan. 2013.  
2013 F. Bélanger, R. E. Crossler, J. S. Hiller, J. Park, and M. Hsiao, “POCKET: A Tool for Protecting Children’s Privacy Online,” Elsevier Decision Support Systems, vol. 54, issue 2, 2013, pp. 1161–1173. Information privacy, Privacy, COPPA, Children, Design science, IT artifact
2012 B. Bahrak and J. Park, “Security of spectrum learning in cognitive radios,” SK Telecom Telecommunications Review, vol. 22, no. 6, Dec. 2012, pp. 850–864.  
2012 D. Bakshi, S. Prabhu, and M. S. Hsiao, "LBIST Reseeding With a New SMT-based Chainability Analysis," in SRC TECHCON, September 2012.  
2012 G. Shrestha and M. S. Hsiao, "Ensuring trust of third-party hardware design with constrained sequential equivalence checking," in Proceedings of IEEE International Conf. on Technologies for Homeland Security (HST), Nov. 2012. Automatic test pattern generation, Benchmark testing, Circuit faults, Integrated circuit modeling, Logic gates, Trojan horses, Vectors
2012 H. Nguyen and M. S. Hsiao, "Sequential equivalence checking of hard instances with targeted inductive invariants and efficient filtering strategies," in Proceedings of the IEEE High Level Design Validation and Test Workshop (HLDVT), November 2012. Communication, Networking & Broadcasting; Components, Circuits, Devices & Systems; Computing & Processing (Hardware/Software)
2012 M. Li, K. Gent, and M. S. Hsiao, "Design validation of RTL circuits using evolutionary swarm intelligence," in Proceedings of the IEEE International Test Conference (ITC), November, 2012. Benchmark testing, Databases, Hardware design languages, Instruments, Measurement, Sociology, Vectors
2012 N. J. Short, A. L. Abbott, M. S. Hsiao, and E. A. Fox, “Robust Feature Extraction in Fingerprint Images using Ridge Model Tracking,” Proceedings: IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS 2012), Arlington, VA, Sept. 2012. (Runner-up for Best Student Paper award.) Bayesian methods, Feature extraction, Filtering, Fingerprint recognition, Gray-scale, Image matching, Robustness
2012 N. J. Short, A. L. Abbott, M. S. Hsiao, and E. A. Fox, “Temporal Analysis of Fingerprint Impressions,” Proceedings: IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS 2012), Arlington, VA, Sept. 2012. Bifurcation, Databases, Feature extraction, Fingerprint recognition, Fingers, Reliability, Skin
2012 S. Wu, L.-T. Wang, X. Wen, W.-B. Jone, M. S. Hsiao, F. Li, J. C.-M. Li, J.-L. Huang, "Launch-on-shift test generation for testing scan designs containing synchronous and asynchronous clock domains," in ACM Trans. Design Automation of Electronic Systems, vol. 17, no. 4, 2012.  
2013 A. Aysu, C. Patterson, P. Schaumont, "Low-Cost and Area-Efficient FPGA Implementations of Lattice Based Cryptography", IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2013), Austin, TX, June 2013.  
2013 M. Taha, P. Schaumont, "Side-channel Analysis of MAC-Keccak", IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2013), Austin, TX, June 2013.  
2013 P. Schaumont, I. Verbauwhede, "The Exponential Impact of Creativity on Computer-Engineering Education", International Conference on Micro-Electronic Systems Education 2013, Austin, TX, June 2013. Computer engineering education, Design practice, Design project
2013 E. Prouff, P. Schaumont, "Introduction to the CHES 2012 special issue", Journal of Cryptographic Engineering, 3(1):1, Springer, 2013.  
2013 M. Srivastav, Y. Zuo, X. Guo, L. Nazhandali, P. Schaumont, "Study of ASIC Technology Impact Factors on Performance Evaluation of SHA-3 Candidates", 23rd Great Lakes Symposium on VLSI (GLSVLSI), Paris, France, May 2013. SHA-3, ASIC, hash, cryptography, security
2013 P. Schaumont, "Teaching Cyber-physical Systems in Layers", First Workshop on Cyber-Physical Systems Education (CPS-Ed 2013), Philadelpha, PA , April 2013.  
2012 R. Chen, J. Park, and K. Bian, “Robustness against Byzantine failures in distributed spectrum sensing,” Elsevier Computer Communications, Vol. 35, Issue 17, Oct 2012, pp. 2115–2124. Cognitive Radio Networks; Distributed Spectrum Sensing; Byzantine Failure; Spectrum Sensing Data Falsification Attacks; Weighted Sequential Probability Ratio Test
2012 B. Gao, J. Park, Y. Yang, and S. Roy, “A taxonomy of coexistence mechanisms for heterogeneous cognitive radio networks operating in TV white spaces,” IEEE Wireless Communications, Vol. 19, Issue 4, 2012, pp. 41–48.  
2012 B. Bahrak, J. Park, and H. Wu, “Ontology-based spectrum access policies for policy-based cognitive radios,” IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), Oct. 2012.  
2013 D. Ali, J. Park, and A. Amanna, “A feature partitioning approach to case-based reasoning in cognitive radios,” in Proc. of the Int’l Conference on Cognitive Radio Oriented Wireless Networks (CROWNCOM), July 2013.  
2013 K. Bian, J. Park, X. Du, and X. Li, “Enabling fair spectrum sharing: Mitigating selfish misbehaviors in spectrum contention," IEEE Network, 27(3), 16-21.  
2012 M. Srivastav, L. Nazhandali, "Design and Analysis of Multi-Core Homogeneous Systems for Energy Harvesting Applications". 2012 19th IEEE International Conference on Electronics, Circuits and Systems (ICECS), pp.532-535, 9-12 Dec. 2012.  
2012 M. Srivastav, M.B. Henry, L. Nazhandali, "Design of energy-efficient, adaptable throughput systems at near/sub-threshold voltage" ACM Transactions on Design Automation of Electronic Systems (TODAES) in the special issue of Adaptive Power Management for Energy and Temperature Aware Computing Systems" 18(1), 3, Dec 2012. Process variation, low-power, voltage scaling, active unit scaling, multicore, DVFS, 45 nm, energy-efficient
2013 Dinesh Ganta, Leyla Nazhandali, “Easy-to-Build Arbiter Physical Unclonable Function with Enhanced Challenge/Response Set”, The International Symposium on Quality Electronic Design (ISQED), San Jose, CA, March 2013. authentication, chip identifiers, modeling, physical unclonable functions, process variation
2013 Henry, M.B. ; Nazhandali, L., "NEMS-Based Functional Unit Power-Gating: Design, Analysis, and Optimization", IEEE transaction on Circuits and Systems I, Volume 60, issue 2, 2013, pgs. 290-302 Low power electronics, micromechanical devices, nanoelectromechanical systems
2013 Rafeei, L. ; Henry, M.B. ; Nazhandali, L. “Fast Approximation Framework for Timing and Power Analysis of Ultra-Low-Voltage Circuits”, IEEE transactions on Circuits and Systems I, Volume 60, Issue 6, 2013, pgs. 1501-1510. Subthreshold, ultra-low-voltage, voltage scaling
2013 Rashmi Moudgil, Dinesh Ganta, Leyla Nazhandali, Michael Hsiao, Chao Wang, Simin Hall, “A novel statistical and circuit-based technique for counterfeit detection in existing ICs”, Proceedings of the 23rd ACM international conference on Great lakes symposium on VLSI, Paris, France, May 2013 Counterfeit, Aging, Process Variation
2012 Ting Wang and Yaling Yang, "Enhancing Wireless Communication Privacy with Artificial Fading", IEEE MASS, Las Vegas, Nevada, USA, October 8-11, 2012, pp. 173-181  
2013 Chuan Han and Yaling Yang, Understanding the Information Propagation Speed in Multihop Cognitive Radio Networks, IEEE Transactions on Mobile Computing , June 2013 (vol. 12 no. 6) pp. 1242-1255. Information propagation speed, node placement, cognitive radio networks
2013 Ting Wang and Yaling Yang, "Analysis on Perfect Location Spoofing Attacks Using Beamforming", IEEE INFOCOM, Turin Italy, April 14-19, 2013. pp.2778-2786  
2013 K. Adhikari, J. Street, C. Wang, Y. Liu and S. Zhang, "Verifying a quantitative relaxation of linearizability vi a refinement," International SPIN Symposium on Model Checking of Software (SPIN'13). Stony Brook, NY. July 2013.  
2013 A. E. Youssef, S. F. Aly, A. S. Ibrahim, and A. L. Abbott, “Auto-optimized Multimodal Expression Recognition Framework using 3D Kinect Data for ASD Therapeutic Aid,” International Journal of Modeling and Optimization, vol. 3, no. 2, Apr. 2013, pp. 112-115 Kinect, SVM, Emotion, ASD
2013 A. E. Youssef, S. F. Aly, A. S. Ibrahim, and A. L. Abbott, “Auto-optimized Multimodal Expression Recognition Framework using 3D Kinect Data for ASD Therapeutic Aid,” Proceedings: Fifth International Conference on Computer Engineering and Technology (ICCET 2013), Vancouver, Canada, Apr. 2013  
2013 J. H. Cha, A. L. Abbott, and H. H. Szu, “Passive Ranging Redundancy Reduction in Diurnal Weather Conditions,” Proceedings: Independent Component Analyses, Compressive Sampling, Wavelets, Neural Nets, Biosystems, and Nanoengineering XI, SPIE Defense, Security, and Sensing 2013, vol. 8750, Baltimore, MD, May 2013.  
2013 M. Elbayoumi, M. S. Hsiao, and M. ElNainay, “Set-cover-based critical implications selection to improve SAT-based bounded model checking,” in Proceedings of the IEEE/ACM Great Lakes Symposium on VLSI, May 2013. Bounded Model Checking, Static Implications, Satisability
2013 M. S. Hsiao, L. Nazhandali, C. Wang, and P. Schaumont, “Counterfeit-Proof + Anti-Tamper Countermeasures = Trusted Supply Chain,” in Government Microcircuit Applications & Critical Technology Conf. (GOMACTech), Mar. 2013.  
2013 S. Prabhu, M. S. Hsiao, Lingappan, L. and Gangaram, V. “Test generation for circuits with embedded memories using SMT,” Proceedings of the IEEE European Test Symposium (ETS), May 2013.  
2013 D. Mane, P. Schaumont, "Energy-Architecture Tuning for ECC-based RFID Tags", 9th Workshop on RFID Security (RFIDSec 2013), Graz, Austria, July 2013. Public key cryptography, Elliptic curves, RFID, Energy, harvesting, Throughput, Digital signatures
2013 K. Pabbuleti, D. Mane, A. Desai, C. Albert, P. Schaumont, "SIMD Acceleration of Modular Arithmetic on Contemporary Embedded Platforms," 2013 IEEE High Performance Extreme Computing Conference (HPEC'13), Waltham, MA, September 2013.  
2013 M. Taha, P.Schaumont, "Differential Power Analysis of MAC-Keccak at Any Key-Length," 8th International Workshop on Security (IWSEC2013), Okinawa, Japan, November 2013.  
2013 A. Aysu, N. Ghalaty, Z. Franklin, M. Yali, P. Schaumont, "Digital Fingerprints for Low-Cost Platforms using MEMS sensors," 8th Workshop on Embedded Systems Security (WESS 2013), September 2013, Montreal. Digital Fingerprints, Physical Authentication, Accelerometer Sensor, RFID, Microcontrollers
2013 P. Schaumont, A. Aysu, "Three Design Dimensions of Secure Embedded Systems," Third International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE 2013), October 2013, Kharagpur, India (invited paper). Design Methods, Hardware/Software Codesign, Montgomery Multiplication, PUFs, Countermeasure
2013 K. Gent and M. S. Hsiao, “Functional test generation at the RTL using swarm intelligence and bounded model checking,” Proceedings of the IEEE Asian Test Symposium, November 2013. ACO, ATPG, Ant colony optimization, BMC, Bounded model checking, Functional test, RTL, Swarm intelligence
2013 M. Elbayoumi, M. S. Hsiao and M. Elnainay, “Selecting critical implications with set-covering formulation for SAT-based bounded model checking,” Proceedings of the IEEE International Conference on Computer Design, October 2013.  
2013 K. Bian, J. Park, X. Du, and X. Li, “Ecology-inspired coexistence of heterogeneous wireless networks,” 2013 IEEE Global Communications Conference (GLOBECOM), Atlanta, USA, Dec. 2013.    
2013 V. Kumar, J. Park, T. C. Clancy, and K. Bian, “PHY-Layer authentication by introducing controlled inter symbol interference,” IEEE Conference on Communications and Network Security (CNS), Washington, D.C., Oct., 2013.    
2013 L. Zhang, A. Chattopadhyay, and C. Wang, "Round-Up: Runtime checking quasi linearizability of concurrent data structures," IEEE/ACM International Conference on Automated Software Engineering (ASE'13). Palo Alto, CA. 2013.  
2013 M. Kusano and C. Wang, "CCmutator: A mutation generator for concurrency constructs in multithreaded C/C++ applications," IEEE/ACM International Conference on Automated Software Engineering (ASE'13). Palo Alto, CA. 2013.  
2013 H. Eldib and C. Wang, "An SMT based method for optimizing arithmetic computations in embedded software code," International Conference on Formal Methods in Computer-Aided Design (FMCAD'13). Portland, OR. 2013.  
2013 L. (Nathan) Li and C. Wang, "Dynamic analysis and debugging of binary code for security applications," International Conference on Runtime Verification (RV'13). Rennes, France. 2013.  
2013 Awadallah, M., Ghannam, S., Abbott, A., & Ghanem, A. (2013). Active Contour Models for Extracting Ground and Forest Canopy Curves from Discrete Laser Altimeter Data. Proceedings: 13th International Conference on LiDAR Applications for Assessing Forest Ecosystems (SilviLaser 2013), Beijing, China, October 2013, pp. 129-136.  
2014 H. Eldib, C. Wang and P. Schaumont, "SMT-Based Verification of Software Countermeasures against Side-Channel Attacks", 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 14), pp. 62-77, Grenoble, France, April 2014.  
2014 N.F. Ghalaty, A. Aysu, P. Schaumont, "Analyzing and Eliminating the Causes of Fault Sensitivity Analysis", Design, Automation & Test in Europe (DATE 2014), Dresden, Germany, March 2014.  
2013 A. Aysu, P. Schaumont, "PASC: Physically Authenticated Stable-Clocked SoC Platform on Low-Cost FPGAs", 2013 International Conference on Reconfigurable Computing and FPGAs, December 2013.  
2014 A. Maiti, P. Schaumont, "The Impact of Aging on a Physical Unclonable Function", IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 22(9), 1854-1864. Aging, physical unclonable function (PUF), ring oscillator (RO), security, variability
2014 Wang, C., & Hoang, K. (2014). Precisely Deciding Control State Reachability in Concurrent Traces with Limited Observability. Verification, Model Checking, and Abstract Interpretation; Lecture Notes in Computer Sciences, 8318,  376-394.  
2012 Sinha, A., Malik, S., Wang, C., & Gupta, A. (2012). Predicting Serializability Violations: SMT-Based Search vs. DPOR-Based Search. Hardware and Software: Verification and Testing; Lecture Notes in Computer Science, 7261, 95-114.  
2013 Bahrak, B., & Park, J.-M. (2013). Security of Spectrum Learning in Cognitive Radios. SK Telecom Telecommunications Review, 22(6), 850-864.  
2014 Eldib, H., Wang, C., Taha, M., & Schaumont, P. (2014). "QMS: Evaluating the Side-channel Resistance of Masked Software from Source Code," ACM/IEEE Design Automation Conference, San Francisco, CA. June 2014.  
2011 Yang, Y., Han, C., & Gao, B. (2011). Delay in Cognitive Radio Networks. In F. R. Yu (Ed.), Cognitive Radio Mobile Ad Hoc Networks (pp. 249-284): Springer New York.  
2013 Desai, A. R., Ganta, D., Hsiao, M. S., Nazhandali, L., Chao, W., & Hall, S. (2013). Anti-counterfeit Integrated Circuits using fuse and tamper-resistant time-stamp circuitry. 2013 IEEE International Conference on Technologies for Homeland Security, Nov. 2013.  
2013 Elbayoumi, M., Hsiao, M. S., & ElNainay, M. (2013). A novel concurrent cache-friendly binary decision diagram construction for multi-core platforms. Proceedings of the Conference on Design, Automation and Test in Europe (DATE '13).  
2013 A. E. Youssef, A. S. Ibrahim, and A. L. Abbott, “Automated Gender Identification for Arabic and English Handwriting,” Proceedings: Fifth International Conference on Imaging for Crime Detection and Prevention (ICDP-13), London, UK, Dec. 2013. Best Poster Award natural language processing; handwriting recognition; image classification; support vector machines; learning (artificial intelligence)
2014 Bahrak, B., & Park, J. M. (2014). Coexistence Decision Making for Spectrum Sharing Among Heterogeneous Wireless Systems. IEEE Transactions on Wireless Communications, 13(3), 1298-1307.  
2014 Park, J.-M., Reed, J. H., Beex, A. A., Clancy, T. C., Kumar, V., & Bahrak, B. (2014). Security and Enforcement in Spectrum Sharing (invited paper). Proceedings of the IEEE, 102(3), 270-281.  
2014 Bian, K., Park, J.-M., Chen, L., & Li, X. (2014). Addressing the Hidden Terminal Problem for Heterogeneous Coexistence between TDM and CSMA Networks in White Space. IEEE Transactions on Vehicular Technology, 63(9), 4450-4463.  
2014 Kuan-Yu Liao, Ang-Feng Lin, James C.-M. Li, Michael S. Hsiao, and Laung-Terng Wang, “GPU-based timing-aware test generation for small delay defects,” Proceedings of the IEEE European Test Symposium (ETS), Paderborn, Germany, May 2014. GPU, parallel, small delay defect, test generation
2013 M. Awadallah, A. L. Abbott, V. Thomas, R. H. Wynne, and R. Nelson, “Estimating Forest Canopy Height and Biophysical Parameters using Photon-counting Laser Altimetry,” Proceedings: 13th International Conference on LiDAR Applications for Assessing Forest Ecosystems (SilviLaser 2013), Beijing, China, Oct. 2013.  
2014 M. Taha and P. Schaumont, "Side-Channel Countermeasure for SHA-3 at Almost-Zero Area Overhead", IEEE Symposium on Hardware Oriented Security and Trust (HOST 2014), Arlington, VA, May 2014. cryptography
2014 Mahmoud Elbayoumi, Mihir Choudury, Victor Kravets, Michael S. Hsiao, and Mustafa Elinainay, “TACUE: A Timing-Aware Cuts Enumeration Algorithm for Parallel Synthesis,” Proceedings of the IEEE Design Automation Conference, June 2014. divide and conquer methods, logic design, optimisation
2014 R. Kannavara, P. Schaumont, M. Maniatakos, M. A. Smith, S. Buck, “Innovative Engineering Outreach Using Intel Security and Embedded Tools,” 10th European Workshop on Microelectronics Education, May 2014. computer science education, embedded systems, innovation management, microprocessor chips, security of data
2013 S. Ghannam and A. L. Abbott, “Cross Correlation versus Mutual Information for Image Mosaicing,” International Journal of Advanced Computer Science and Applications (IJACSA), 4(11).  
2014 Bahrak, B., Bhattarai, S., Ullah, A., Park, J.-M. J., Reed, J., & Gurney, D. (2014, 1-4 April 2014). Protecting the primary users' operational privacy in spectrum sharing. 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN), 236-247.  Best Paper Award  
2013 M. Awadallah, A. L. Abbott, V. Thomas, R. H. Wynne, and R. Nelson, “Estimating Forest Canopy Height and Biophysical Parameters using Photon-counting Laser Altimetry,” Proceedings: 13th International Conference on LiDAR Applications for Assessing Forest Ecosystems (SilviLaser 2013), Beijing, China, Oct. 2013, pp. 137-144  
2013 S. Prabhu and M.S. Hsiao, "Property-Checking Based LBIST
for Efficient Response Compression
," SRC TECHCON, September 2013.
 
2014 Ganta, D. & Nazhandali, L. (2014) "Study of IC aging on ring oscillator physical unclonable functions," 15th International Symposium on Quality Electronic Design (ISQED), pp.461-466, 3-5 March 2014.  
2014 Ganta, D. & Nazhandali, L. (2014) "Circuit-level approach to improve the temperature reliability of Bi-stable PUFs," 15th International Symposium on Quality Electronic Design (ISQED), pp.467-472, 3-5 March 2014.  
2014 Khatir, M. & Nazhandali, L. (2014) “Sense Amplifier Pass Transistor Logic for energy efficient and DPA-resistant AES circuit”, 15th International Symposium on Quality Electronic Design (ISQED), pp 517-522, 3-5 March 2014.  
2014 Aysu, A., Gulcan, E., & Schaumont, P. (2014). SIMON Says: Break Area Records of Block Ciphers on FPGAs. Embedded Systems Letters, IEEE, 6(2), 37-40.  
2014 Eldib, H., & Wang, C. (2014). Synthesis of Masking Countermeasures against Side Channel Attacks. In A. Biere & R. Bloem (Eds.), Computer Aided Verification (Vol. 8559, pp. 114-130): Springer International Publishing.  
2014 L. Zhang & C. Wang (2014) "Runtime prevention of concurrency related type-state violations in multithreaded applications," International Symposium on Software Testing and Analysis. Type state automaton, race condition, failure mitigation, program repair, model checking, partial order reduction
2014 Gao, B., Park, J. J., & Yang, Y. (2014). Uplink Soft Frequency Reuse for Self-Coexistence of Cognitive Radio Networks. Mobile Computing, IEEE Transactions on, 13(6), 1366-1378. Downlink, Games, Interference, Mobile computing, OFDM, Resource management, Uplink, Algorithm/protocol design and analysis, Cognitive radio, OFDMA, Wireless communication, non-cooperative game, soft frequency reuse, spectrum sharing
2014 B. Gao, J. Park, and Y. Yang, “Supporting mobile users in database-driven opportunistic spectrum access,” 2014 ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), Aug. 2014. Opportunistic spectrum access, Geolocation database, Spectrum sharing, Mobility management
2014 L. Chen, K. Bian, L. Chen, C. Liu, J. Park, and X. Li, “A group-theoretic framework for rendezvous in heterogeneous cognitive radio networks,” 2014 ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), Aug. 2014.         Cognitive radio, Rendezvous, Heterogeneous
2014 B. Gao, Y. Yang, and J. Park, “A credit-token-based spectrum etiquette framework for coexistence of heterogeneous cognitive radio networks,” 2014 IEEE Int’l Conference on Computer Communications (INFOCOM), April–May, 2014. Cognitive radio, Game theory
2014 V. Kumar, J. Park, T. C. Clancy, K. Bian, (2014) “PHY-layer authentication using hierarchical modulation and duobinary signaling,” 2014 International Conference on Computing, Networking, and Communications (ICNC), Feb. 2014, 782-786. message authentication, radio spectrum management, telecommunication signalling, ISI, PHY-layer authentication, SNR, authentication-identification signal, blind signal superposition, cognitive radio network, duobinary signaling, hierarchical modulation
2014 J. Thakkar, D. Ali, J. Park, and S. Moon, “Securing a distributed policy-based cognitive radio,” 2014 ACM Int’l Conference on Ubiquitous Information Management and Communication (IMCOM), Jan. 2014.    
2011 K. Hoyle, N. Short, M. S. Hsiao, and A. L. Abbott, E. A. Fox, "Minutiae + Friction Ridges = Triplet-Based Features for Determining Sufficiency in Fingerprints," Technical Report, CESCA-2011-001, Bradley Dept. of Electrical and Computer Engineering, Virginia Tech, June 2, 2011.  
2011 N. Short, A. L. Abbott, M. Hsiao, and E. Fox "A Bayesian Approach to Fingerprint Minutia Localization and Quality Assessment using Adaptable Templates," Technical Report, CESCA-2011-002, Bradley Dept. of Electrical and Computer Engineering, Virginia Tech, June 2, 2011.  
2012 N. Short, A. L. Abbott, M. Hsiao, and E. Fox "Robust Feature Extraction in Fingerprint Images using Ridge Model Tracking," Technical Report, CESCA-2012-001, Bradley Dept. of Electrical and Computer Engineering, Virginia Tech, March 5, 2012.  
2014 Xu, Y., Kim, I., & Schaumont, P. (2014). Adaptive Bayes sum test for the equality of two nonparametric functions. Journal of Applied Statistics, 1-19. Bayes sum test, discrete Fourier transform, Neyman test, Laplace approximation, resampling
2014 Prabhu, S., Acharya, V. V., Bagri, S., & Hsiao, M. S. (2014). "Property-checking based LBIST for improved diagnosability," 19th IEEE European Test Symposium (ETS), .pp.1-2, Paderborn, Germany, May 2014. built-in self test, integrated logic circuits, logic testing
2014 Bhunia, S., Hsiao, M. S., Banga, M., & Narasimhan, S. (2014). Hardware Trojan Attacks: Threat Analysis and Countermeasures. Proceedings of the IEEE, 102(8), 1229-1247. Circuit faults, Computer security, Fabrication, Hardware, Integrated circuit modeling, Integrated circuits, Trojan horses, Hardware intellectual property (IP) trust, Trojan detection, Trojan taxonomy, Trojan tolerance, hardware Trojan attacks, hardware obfuscation, self-referencing, side-channel analysis
2014 Cha, J.H., Abbott, A.L., Szu, H.H., Willey, J.,Landa, J. & Krapels, K.A. (2014) Neuromorphic implementation of a software-defined camera that can see through fire and smoke in real-time. Proc. SPIE 9118, Independent Component Analyses, Compressive Sampling, Wavelets, Neural Net, Biosystems, and Nanoengineering XII, 911809. Cameras, Software, Machine learning, Thermodynamics
2014 Cha, J.J., Abbott, A.L., Krapels, K.A. and Szu, H.H. (2014)
Theory of enhancing thermal imaging through fire, Proc. SPIE 9118, Independent Component Analyses, Compressive Sampling, Wavelets, Neural Net, Biosystems, and Nanoengineering XII, 91180A.
Infrared imaging, Radiation, Sensors, Software, Thermodynamics, Visual system, Cameras, Displays, Image quality, Imaging systems
2014 K. Bian, J. Park, and B. Gao, Cognitive Radio Networks: Medium Access Control for Coexistence of Wireless Systems, Springer, 2014, print ISBN: 978-3-319-07328-6, online ISBN: 978-3-319-07329-3.  
2014 E. Gulcan, A. Aysu, P. Schaumont, "A Flexible and Compact Hardware Architecture for the SIMON Block Cipher," Third International Workshop on Lightweight Cryptography for Security & Privacy (LightSec 2014), Istanbul, Turkey, September 2014. Lightweight cryptography, Block ciphers, Flexible architectures, SIMON, FPGA
2014 Hassan Eldib and Chao Wang. "An SMT based method for optimizing arithmetic computations in embedded software code," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 33(11), 1611-1622. Benchmark testing, Dynamic range, Embedded software, Finite wordlength effects, Microcontrollers, Optimization, Fixed point arithmetic, inductive program synthesis, satisfiability modulo theory (SMT) solver, superoptimization
2014 Zhang, J. Iyer, S., Zheng, X., Schaumont, P. and Yang, Y. (2014) “Hardware-Software Co-design for Heterogeneous Multiprocessor Sensor Nodes”, 2014 IEEE Global Communications Conference (GLOBECOM), .20-25, Austin, TX. Computer architecture, Coprocessors, Field programmable gate arrays, Hardware, Program processors, Programming
2014 Jingyao Zhang, Zhenhe Pan, Patrick Schaumont, and Yaling Yang (2014) "Application Design and Performance Evaluation For Multiprocessor Sensor Nodes", 2014 IEEE Wireless Communications and Networking Conference (WCNC), 3272-3277, Istanbul, Turkey. Coprocessors, Energy consumption, Field programmable gate arrays, Hardware, Microcontrollers, Wireless communication, Wireless sensor networks
2014 K. Pabbuleti, D. Mane, P. Schaumont, "Energy Budget Analysis for Signature Protocols on a Self-Powered Wireless Sensor Node," 10th Workshop on RFID Security (RFIDSec 2014), Oxford, UK, July 2014. Wireless Sensor Node, Public Key Cryptography, Digital signatures, Elliptic Curves, Hashing
2014 Zeng, K., Ramesh, S.K. and Yang, Y. "Location Spoofing Attack and Its Countermeasures in Database-Driven Cognitive Radio Networks," 2014 IEEE Conference on Communications and Network Security (CNS), October 2014. Frequency modulation, Global Positioning System, IEEE 802.11 Standards, Interference, Receivers, Security, TV
2014 Kexiong (Curtis) Zeng, Sreeraksha Kondaji Ramesh and Yaling Yang. "Location Robustness in Database-Driven White Spaces Network", Proceedings of the 2014 IEEE Symposium on Dynamic Spectrum Access Networks (Dyspan), April 2014, pp. 354-357. Global Positioning System, convergence, digital television, interference suppression, query processing, radio networks, radio spectrum management, telecommunication security
2014 Markus Kusano and Chao Wang. "Assertion guided abstraction: a cooperative optimization for dynamic partial order reduction," IEEE/ACM International Conference on Automated Software Engineering (ASE'14). Vasteras, Sweden. 2014. Stateless model checking, partial order reduction, predicate depen-dence, assertion guided abstraction, cooperative analysis
2014 Mitra Befrouei, Chao Wang, and Georg Weissenbacher. "Abstraction and mining of traces to explain concurrency bugs," International Conference on Runtime Verification (RV'14). Toronto, Canada. 2014. Best Paper Nominee  
2014 N. F. Ghalaty, B. Yuce, M. Taha, P. Schaumont, "Differential Fault Intensity Analysis," 11th Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2014), 49-58, Busan, Korea, September 2014. AES, Fault Analysis, Fault Injection, Fault Intensity
2015 S. Kim, J. Park, and K. Bian, “PSUN: An OFDM Scheme for Coexistence with Pulsed Radar,” 2015 Int’l Conference on Computing, Networking, and Communications (ICNC), California, USA, Feb. 2015. Channel coding, Interference, OFDM, Radar, Radar antennas, Wireless communication
2014 Prabhu, S., Acharya, V., Bagri, S. and Hsiao, M.S. "A diagnosis-friendly LBIST architecture with property checking," Proceedings of the IEEE International Test Conference (ITC), October 2014. Built-in self-test, Circuit faults, Computer architecture, Hardware, Monitoring, System-on-chip, Vectors
2014 V. Kumar, J. Park, and K. Bian, “Blind transmitter authentication for spectrum security and enforcement,” 2014 ACM Conference on Computer and Communications Security (CCS), 787-798, Arizona, USA, Nov. 2014.    
2015 Z. Al-Bayati, Q. Zhao, A. Youssef, H. Zeng, and Z. Gu. “Enhanced Partitioned Scheduling of Mixed-Criticality Systems on Multicore Platforms.” 20th Asia and South Pacific Design Automation Conference (ASP-DAC), 630-635, January 2015. Multicore processing, Partitioning algorithms, Processor scheduling, Program processors, Real-time systems, Schedules, Scheduling
2014 C. Dong, H. Zeng, and M. Chen. “A Cost Efficient Online Algorithm for Automotive Idling Reduction.” 51st ACM/IEEE Design Automation Conference (DAC), June 2014.  
2014 E. Wozniak, M. Di Natale, H. Zeng, C. Mraidha, S. Tucci-Piergiovanni, and S. Gerard. “Assigning Time Budgets to Component Functions in the Design of Time-Critical Automotive Systems” 29th IEEE/ACM International Conference on Automated Software Engineering (ASE), September 2014. design, Design space exploration, real-time, end-to-end deadlines, time budgeting, AUTOSAR, optimization, generic algorithm
2014 F. Kong, C. Dong, X. Liu, and H. Zeng. “Blowing Hard Is Not All We Want:  Quantity vs Quality of Wind Power in the Smart Grid.” 32nd IEEE International Conference on Computer Communications (INFOCOM), April 2014. Gaussian processes, power generation planning, power supply quality, regression analysis, smart power grids, wind power plants, wind turbines
2014 F. Kong, C. Dong, X. Liu, and H. Zeng. “Quantity vs Quality: Optimal Harvesting Wind Power for the Smart Grid”, Proceedings of the IEEE, 102(11), 1762-1776. Energy harvesting, renewable energy, smart grid, wind farm planning, wind power
2014 G. Han, H. Zeng, M. Di Natale, X. Liu, and W. Dou. “Experimental Evaluation and Selection of Data Communication Mechanisms in Multicore Platforms.” IEEE Transactions on Industrial Informatics (TII) 10(2): 903-918, May 2014. Data consistency, flow preservation, hard real-time, multicore, multiprocessor priority ceiling protocol (MPCP), multiprocessor stack resource policy (MSRP), optimization, wait-free
2014 H. Zeng and M. Di Natale. “Computing periodic request functions to speed-up the analysis of non-cyclic task models.” Real-Time Systems Journal, 51(4): 360-394, July 2015. Real-time schedulability, Task graph model, Max-plus algebra, Request/Demand bound functions
2014 H. Zeng, M. Di Natale, and Q. Zhu. “Minimizing Stack and Communication Memory Usage in Real-time Embedded Applications.” ACM Transactions on Embedded Computing Systems (TECS) 13(5s): 1-25, July 2014. Preemption threshold scheduling, stack requirement, data synchronization mechanism, memory usage
2014 P. Deng, Q. Zhu, M. Di Natale, and H. Zeng. (2014) “Task Synthesis for Latency-sensitive Synchronous Block Diagrams.” 9th IEEE International Symposium on Industrial Embedded Systems (SIES), June 2014. Best Paper Award Finalist Software resuability
2014 G. A. Christie, K. B. Kochersberger, and A. L. Abbott. (2015) “Image-based 3D Reconstructions for Stockpile Volume Measurement,” Mining Engineering, 67(1), 34-37.  
2014 A. Sarkar, A. L. Abbott, and Z. Doerzaph, “Assessment of Psychophysiological Characteristics Using Heart Rate from Naturalistic Face Video Data,” Proceedings: International Joint Conference on Biometrics (IJCB 2014), Clearwater, FL, Sept. 2014. face recognition, traffic engineering computing, video signal processing
2014 S. Aly, A. Youssef, and A. L. Abbott, “Adaptive Feature Selection and Data Pruning for 3D Facial Expression Recognition using the Kinect,” Proceedings: IEEE  International Conference on Image Processing (ICIP 2014), 1361-1365, Paris, France, Oct. 2014. Data Pruning, Facial Expression Recognition, Kinect, SVM
2014 M. Awadallah, A. L. Abbott, and S. Ghannam, “Segmentation of Sparse Noisy Point Clouds using Active Contour Models,” Proceedings: IEEE  International Conference on Image Processing (ICIP 2014), 6061-6065, Paris, France, Oct. 2014. Active contours, point clouds
2015 Christie, G., Kochersberger, K., & Abbott, A. L. (2015). Fast inspection for size-based analysis in aggregate processing. Machine Vision and Applications. 26(1), 31-40. 2D image segmentation, Size distribution, Oversize rocks, Conveyor belt, Support vector machine, Quarry
2014 Ghannam, S., Awadallah, M., Abbott, A.L. & Wynne, R.H. (2014). Multisensor multitemporal data fusion using the wavelet transform. The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences (ISPRS) Technical Commission I Symposium. Denver, Colorado. November 2014. Fusion, multiresolution, multitemporal, wavelet
2014 Gent, K., & Hsiao, M. S. (2014). Dual-Purpose Mixed-Level Test Generation Using Swarm Intelligence. 2014 IEEE 23rd Asian Test Symposium (ATS), 230-235, November 2014. ATPG, Ant Colony Optimization, Branch Coverage, ITC99, Mixed Level Test, RTL Test, Stuck-at Fault, Swarm Intelligence, co-simulation
2015 S. Aly, A. Trubanova, L. Abbott, S. White & A. Youssef. (2015) "VT-KFER: A Kinect-based RGBD+Time Dataset for Spontaneous and Non-Spontaneous Facial Expression Recognition",  2015 International Conference of Biometrics (ICB), 90-97, Thailand. face recognition, image colour analysis, image sensors
2015 Al-bayati, Z., Qingling, Z., Youssef, A., Haibo, Z., & Zonghua, G. (2015). Enhanced partitioned scheduling of Mixed-Criticality Systems on multicore platforms. 2015 20th Asia and South Pacific Design Automation Conference (ASP-DAC), 630-635. Multicore processing, Partitioning algorithms, Processor scheduling, Program processors, Real-time systems, Schedules, Scheduling
2015 Bagri, S., Gent, K., & Hsiao, M. S. (2015). Signal domain based reachability analysis in RTL circuits. 16th International Symposium on the Quality Electronic Design (ISQED), 250-256, March 2015. Arrays, Benchmark testing, Hardware, Hardware design languages, Instruments, Optimization, Switches, RTL, Reachability, Signal Domain, Verification
2015 Elbayoumi, M., Hsiao, M. S., & ElNainay, M. (2015). Novel SAT-based invariant-directed low-power synthesis.  16th International Symposium on Quality Electronic Design (ISQED), 217-222, March 2015. Algorithm design and analysis, Clocks, Computational modeling, Integrated circuit modeling, Logic gates, Model checking, Power demand
2015 Aysu, A., & Schaumont, P. (2015) Hardware/software co-design of physical unclonable function based authentications on FPGAs. Microprocessors and Microsystems, 39(7), 589-597. Physical Unclonable Functions; System-on-Chip Integration; HW/SW co-design; Ring oscillator; Time-to-digital converters; FPGA
2015 Schaumont, P., O'Neill, M., & Güneysu, T. (2015). Introduction for Embedded Platforms for Cryptography in the Coming Decade. ACM Transactions on Embedded Computing Systems (TECS), 14(3), 1-3.  
2015 Aysu, A., Yuce, B., & Schaumont, P. (2015). The Future of Real-Time Security: Latency-Optimized Lattice-Based Digital Signatures. ACM Transactions on Embedded Computing Systems (TECS), 14(3), 1-18.  
2015 Cha, J.H., Abbott, A.L., and Reynolds, J.P. (2015). "Thermal image enhancement construct for seeing through obscurants", Proc. SPIE 9496, Independent Component Analyses, Compressive Sampling, Large Data Analyses (LDA), Neural Networks, Biosystems, and Nanoengineering XIII, 94960K Image enhancement, Radiation, Sensor performance, Composites, Image registration, Imaging systems, Long wavelength infrared, Mid-IR, Modeling, Numerical simulations
2015 Gent, K., & Hsiao, M. S. (2015). Abstraction-based relation mining for functional test generation. IEEE 33rd VLSI Test Symposium (VTS), 27-29 April 2015. Benchmark testing, Databases, Engines, IEEE Computer Society, Instruments, Optimization, Pipelines
2015 Xiong, J., Wu, D., Zeng, H., Liu, S., & Wang, X. (2015). Impact assessment of electric vehicle charging on hydro Ottawa distribution networks at neighborhood levels. 2015 IEEE 28th Canadian Conference on Electrical and Computer Engineering (CCECE), 1072-1077. Batteries, Computers, Electronic mail, Lead, Load modeling, Power demand, Standards
2015 Acharya, V. V., Bagri, S., & Hsiao, M. S. (2015). Branch guided functional test generation at the RTL. 2015 20th IEEE European Test Symposium (ETS), pp. 1-6. Genetic algorithms, Hardware design languages, Indexes, Instruments, Semantics, Sociology, Statistics, Algorithms, Branch Coverage, RTL, Test Generation
2015 Wang, C., Gu, Z., & Zeng, H. (2015). Integration of Cache Partitioning and Preemption Threshold Scheduling to Improve Schedulability of Hard Real-Time Systems. 2015 27th Euromicro Conference on the Real-Time Systems (ECRTS), 69-79. Bismuth, Mathematical model, Optimization, Partitioning algorithms, Processor scheduling, Real-time systems, Scheduling, cache partitioning, real-time scheduling, schedulability
2015 A. Aysu, E. Gulcan, D. Moriyama, P. Schaumont, M. Yung "End-to-end Design of a PUF based Privacy Preserving Authentication Protocol" Cryptographic Hardware and Embedded Systems (CHES 2015), St Malo, France, September 2015. Physically unclonable function, Authentication, Privacy-preserving protocol, Implementation
2015 E. Gulcan, A. Aysu, P. Schaumont, "BitCryptor: Bit-Serialized Compact Crypto Engine on Reconfigurable Hardware" IACR ePrint Archive 2015/744, July 2015. Lightweight cryptography, bit-serialization, hardware architecture, crypto engine, SIMON, FPGA
2015 N. Farhady Galathy, B. Yuce, P. Schaumont, "Analyzing the Efficiency of Biased-Fault Attacks" IACR ePrint Archive 2015/663, June 2015. Differential Attack, Fault Intensity, Biased Fault, Fault Intensity
2015 A. Aysu, P. Schaumont, "Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms," IACR ePrint Archive 2015/255. Precomputation, Post-Quantum Signatures, Hash-based Signatures, Lattice-based Signatures, Energy Harvesting Platforms
2015 H. Eldib, C. Wang, M. Taha, P. Schaumont (2015) "Quantitative Masking Strength: Quantifying the Power Side-Channel Resistance of Software Code," IEEE Transactions on Computer Aided Design of Integrated Circuits and Systems (TCAD), 34(10), 1558-1568. Verification, countermeasure, differential power analysis, quantitative masking strength, satisfiability modulo theory (SMT) solver, security
2015 N. F. Galathy, B. Yuce, P. Schaumont, "Differential Fault Intensity Analysis on PRESENT and LED Block Ciphers," Sixth International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2015), LNCS 9064, 174-188, July 2015.

Differential attack, Fault intensity, Light-weight block cipher, PRESENT, LED

2015 B. Yuce, N. F. Galathy, P. Schaumont, "TVVF: Estimating the Vulnerability of Hardware Cryptosystems against Timing Violation Attacks," IEEE International Symposium on Hardware Oriented Security and Trust (HOST-2015), 72-77, May 2015. Cryptography, Secure Hardware Design, Timing Violation Fault Attacks, Vulnerability Factor
2015 M. Taha, P. Schaumont, "Key-Updating for Leakage Resiliency with Application to AES Modes of Operation," IEEE Transactions on Information Forensics & Security, 10(3):519-528, March 2015. HWS-SIDE, Hardware Security (Side Channels)
2015 Dong, C., Zeng, H., & Chen, M. (2015). Online Algorithms for Automotive Idling Reduction with Effective Statistics. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 34(11), 1742-1755. Algorithm design and analysis, Engines, Fuels, Minimization, Probability density function, Turning, Vehicles, Automotive Idling Reduction, Competitive Analysis, Online Algorithm, Ski Rental Problem
2015 Wu, D., Zeng, H., Boulet, B. (2015). Impact Analysis of EV Charging with Mixed Control Strategy. Journal of Energy and Power Engineering, 9, 731-740. Neighborhood level network, electric vehicle, penetration level, mixed control, charging management, user satisfaction
2015 Kumar, V., Li, H., Park, J.M.,Bian K. & Yang, Y. (2015) Group Signatures with Probabilistic Revocation: A Computationally-Scalable Approach for Providing Privacy-Preserving Authentication. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 1334-1345, Denver, USA, Oct. 2015.  
2015 Schaumont, P, Yuce, B., Pabbuleti, K., & Mane, D. (in press). Secure Authentication with Energy-harvesting: A Multi-dimensional Balancing Act. Sustainable Computing: Informatics and Systems Energy Harvesting, Authentication Protocols, Energy Measurement, Cryptographic Engineering
2015 Zhao, Q., Gu, Z. & Zeng, H. (2015). Resource Synchronization and Preemption Thresholds Within Mixed-Criticality Scheduling. ACM Transactions on Embedded Computing Systems (TECS), 14(4), Article No. 81, October 2015.  
2016 Aysu, A. & Schaumont, P. (2015). Precomputation Methods for Hash-based Signatures on Energy-Harvesting Platforms. IEEE Transactions on Computers, 65(9), 2925-2931. Energy Harvesting Platforms, Hashbased Signatures, Precomputation
2015 Gulcan, E., Aysu, A. & Schaumont, P. (2015). BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight Applications. Progress in Cryptology -- INDOCRYPT 2015, 329-346. Lightweight cryptography, Bit-serialization, Hardware architecture, Crypto engine, SIMON, FPGA
2016 K. Adhikari, J. Street, C. Wang, Y. Liu, and S. Zhang (2016)“Verifying a Quantitative Relaxation of Linearizability via Refinement,” Springer International Journal on Software Tools for Technology Transfer (STTT), 18(4), 393-407. Linearizability, Model checking, Concurrent data structure, Refinement, Quantitative relaxation
2015 Z. Al-Bayati, Y. Sun, H. Zeng, M. Di Natale, Q. Zhu, and B. Meyer. “Task Placement and Selection of Data Consistency Mechanisms for Real-Time Multicore Applications.” Proceedings of the 21st IEEE Real-Time and Embedded Technology and Application Symposium (RTAS), April 2015. Hardware, Multicore processing, Partitioning algorithms, Protocols, Real-time systems, Resource management, Time factors
2015 S. Bhattarai, A. Ullah, J. Park, J. Reed, D. Gurney, and B. Gao, “Defining incumbent protection zones on the fly: Dynamic boundaries for spectrum sharing,” 2015 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), Sweden, Sep.¬–Oct. 2015. Dynamic Spectrum Access, Exclusion Zone, Protection Zone, Spectrum Access System, Spectrum Sharing
2015 R. Bloem, B. Konighofer, R. Konighofer, and C. Wang, “Shield Synthesis: Runtime Enforcement for Reactive Systems,” Proceedings: International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS 2015). April 2015. n/a
2015 P. Deng, F. Cremona, Q. Zhu, M. Di Natale, and H. Zeng. “A Model-based Synthesis Flow for Automotive CPS.” Proceedings of the 6th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), April 2015. n/a
2015 Y. Dou, K. Zeng, Y. Yang, D. Yao, “MadeCR: Correlation-based Malware Detection for Cognitive Radio,” 2015 IEEE Conference on Computer Communications (INFOCOM), April 26 – May 1 2015. Databases, Detectors, Hidden Markov models, Malware, Runtime, Training
2015 S. Guo, M. Kusano, C. Wang, Z. Yang, and A. Gupta, “Assertion Guided Symbolic Execution of Multithreaded Programs,” Proceedings: ACM Symposium of the Foundations of Software Engineering (FSE 2015). Aug 2015. n/a
2015 S. Khoshnood, M. Kusano, and C. Wang, “ConcBugAssist: Constraint Solving for Diagnosis and Repair of Concurrency Bugs,” Proceedings: International Symposium on Software Testing and Analysis (ISSTA 2015). July 2015. n/a
2015 M. Kusano, A. Chattopadhyay, and C. Wang, “Dynamic Generation of Likely Invariants for Multithreaded Programs,” Proceedings: IEEE/ACM International Conference on Software Engineering (ICSE 2015). May 2015. concurrent program, invariant generation, likely invariant, partial order reduction, transition invariant
2015 B. Mak, M. Chen, G. Zhang, L. Huang, and H. Zeng. “Online energy management strategy for Hybrid Electric Vehicle.” In Proceedings of the 6th International Conference on Future Energy Systems (ACM e-Energy), Poster/Demo, July 2015 n/a
2015 I. Munagani, M. S. Hsiao, and A. L. Abbott, “On the Uniqueness of Fingerprints via Mining of Statistically Rare Features,” Proceedings: IEEE International Symposium on Technologies for Homeland Security (HST 2015), Boston, MA, Apr. 2015 Fingerprint, minutia, rare features, singular points, triple
2015 P. Puri and M. S. Hsiao, "Fast stimuli generation for design validation of RTL circuits using binary particle swarm optimization," Proceedings of the IEEE International Symposium on VLSI, July 2015. hybrid algorithm, swarm, test generation
2015 P. Puri and M. S. Hsiao, "SI-SMART: functional test generation for RTL circuits using loop abstraction and learning recurrence relationships," Proceedings of the IEEE International Conference on Computer Design (ICCD), October 2015. Biological information theory, Cryptography, Hardware design languages, Lead, Silicon, Transfer functions
2016 Saleh, M., Abbott, A. L. and Flintsch, G. W. “3D Pavement Surface Spherical Representation and Reconstruction,” Proceedings: 95th Annual Meeting of the Transportation Research Board, Washington, D.C., Jan. 2016. n/a
2016 Sarkar, A., Abbott, A. L. and Doerzaph, Z. “Assessment of Video Magnification for Nonintrusive Heart Rate Measurement,” Proceedings: IEEE First International Conference on Control, Measurement and Instrumentation (CMI 2016), Kolkata, India, Jan. 2016.  
2015 A. Sarkar, A. L. Abbott, and Z. Doerzaph, “ECG Biometric Authentication Using a Dynamical Model,” Proceedings: IEEE 7th International Conference on Biometrics: Theory, Applications and Systems (BTAS 2015), Arlington, VA, Sept. 2015. Authentication, Biological system modeling, Electrocardiography, Heart rate, Mathematical model, Parameter estimation
2015 S. Tanwir, S. Prabhu, M. S. Hsiao, and L. Lingappan, "Information-theoretic and statistical methods of failure log selection for improved diagnosis," Proceedings of the IEEE International Test Conference (ITC), October 2015. Circuit faults, Compaction, Industries, Integrated circuit modeling, Measurement, Real-time systems, Testing
2015 A. Ullah, S. Bhattarai, J. Park, J. Reed, D. Gurney, and B. Bahrak, “Multi-tier exclusion zones for dynamic spectrum sharing,” 2015 IEEE Int’l Conference on Communications (ICC), London, UK, June 2015. Computational modeling, Databases, Interference, Propagation losses, Receivers, Signal to noise ratio, Synthetic aperture sonar
2015 Q. Yi, Z. Yang, S. Guo, C. Wang, J. Liu, and C. Zhao, “Post Conditioned Symbolic Execution,” Proceedings: IEEE International Conference on Software Testing, Verification and Validation (ICST 2015). April 2015 Concrete, Explosions, Input variables, Redundancy, Software, Standards, Testing
2015 Q. Yi, Z. Yang, J. Liu, C. Zhao, and C. Wang (2015) “Explaining Software Failures by Cascade Fault Localization,” ACM Transactions on Design Automation of Electronic Systems (TODAES), 20(3), Article No. 41. n/a
2015 Q. Yi, Z. Yang, J. Liu, C. Zhao, and C. Wang, “A Synergistic Analysis Method for Explaining Failed Regression Tests,” Proceedings: IEEE/ACM International Conference on Software Engineering (ICSE 2015). May 2015. n/a
2015 L. Zang, A. Chattopadhyay, and C. Wang, (2015) “Round-Up: Runtime Verification of Quasi Linearizability for Concurrent Data Structures,” IEEE Transactions on Software Engineering (TSE), 41(12), 1202-1216. Runtime verification, atomicity, linearizability, partial order reduction, relaxed consistency, serializability, systematic concurrency testing
2015 N. Zhang, M. Kusano, and C. Wang, “Dynamic Partial Order Reduction for Relaxed Memory Models,” Proceedings: ACM Conference on Programming Language Design and Implementation (PLDI 2015). June 2015. n/a
2016 Kumar, V. Park, J. and Bian K. (2016) "PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement," IEEE Transactions on Information Forensics and Security, 11(5), 1027-1038. PHY-layer authentication, duobinary signaling, spectrum enforcement, spectrum sharing
2016 Zhao, P., Bian, K., Zhao, T., Song, X., Park, J. M., Li Yi, X., Ye, F. and Yan, W. (in press). Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions, IEEE Transactions on Mobile Computing. Authentication, Electronic mail, History, Mobile computing, Reliability, Social network services
2016 B. A. Marcellino and M. S. Hsiao, "Dynamic partitioning strategy to enhance symbolic execution," 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), Dresden, Germany, 2016, pp. 774-779. Symbolic execution, embedded software, partitioning strategies, software testing, static analysis
2016 Z. Al-bayati, J. Caplan, B. H. Meyer and H. Zeng, "A four-mode model for efficient fault-tolerant mixed-criticality systems," 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), Dresden, Germany, 2016, pp. 97-102. Context, Fault tolerance, Fault tolerant systems, Quality of service, Safety, Transient analysis
2016 A. Aysu, S. Gaddam, H. Mandadi, C. Pinto, L. Wegryn and P. Schaumont, "A design method for remote integrity checking of complex PCBs," 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), Dresden, Germany, 2016, pp. 1517-1522. Authentication, Encoding, Entropy, Hardware, Nonvolatile memory, Probability, Protocols, Integrity Verification, PCB, Physical Unclonable Functions
2016 Wang, C., Dong, C., Zeng, H. and Gu, Z. 2016. Minimizing Stack Memory for Hard Real-Time Applications on Multicore Platforms with Partitioned Fixed-Priority or EDF Scheduling. ACM Transactions on Design Automation of Electronic Systems (TODAES), Vol. 21, No.3, Article 46. n/a
2016 K. Gent and M. S. Hsiao, "A control path aware metric for grading functional test vectors," 2016 17th Latin-American Test Symposium (LATS), Foz do Iguacu, Brazil, 2016, pp. 51-56. n/a
2016 Deng, L., Hajiesmaili, M.H., Chen, M. and Zeng, H. 2016. Energy-efficient timely transportation of long-haul heavy-duty trucks. Proceedings of the Seventh International Conference on Future Energy Systems (e-Energy '16). ACM, New York, NY, USA, , Article 10 , 12 pages. n/a
2016 C. Dong, Q. Liu and H. Zeng, 2016. "Traffic Assignment with Maximum Delay Constraint in Stochastic Network," 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring), Nanjing, China, pp. 1-5. n/a
2016 Yuce, B., Ghalaty, N. F., Deshpande, C., Patrick, C., Nazhandali, L. and Schaumont, P. (2016). FAME: Fault-attack Aware Microprocessor Extensions for Hardware Fault Detection and Software Fault Response. Hardware and Architectural Support for Security and Privacy (HASP), Seoul, South Korea. 8 pages. Fault-attack Aware Microprocessor Extensions, Embedded Software
Security
2016 Rawat, H.K. and Schaumont, P. (2016). SIMD Instruction Set Extensions for Keccak with Applications to SHA-3, Keyak and Ketje. Hardware and Architectural Support for Security and Privacy (HASP), Seoul, South Korea. 8 pages. Instruction Set Extensions, KECCAK , ARM NEON, SIMD, SHA3, Authenticated Encryption
2016 S. Bhattarai; J. M. Park; B. Gao; K. Bian; W. Lehr, (in press) "An Overview of Dynamic Spectrum Sharing: Ongoing Initiatives, Challenges, and a Roadmap for Future Research," IEEE Transactions on Cognitive Communications and Networking. Broadband communication, FCC, Interference, Sensors, TV, Wireless communication, Wireless sensor networks

 


    CESCA Logo

 

CESCA Day 2016
 
April 23 (Sat)
Brush Mountain Room
Squires Student Center

Pictures:  main, posters
 

CESCA Student Awards
2016 Awardees
 

For New Graduate Students