Difference between revisions of "Publications"
From ACES
m (typo) |
|||
(13 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
<div style="display:none" class="bibliography"><!-- | <div style="display:none" class="user-only"> | ||
-->{{#invoke:Publications|main}}<!-- | {{#forminput:form=Publication|autocomplete on category=publication|placeholder=The citekey of publication|button text=Create or edit publication}} | ||
<small>The pubkey is usually the last name of the first author followed by the year number; add suffix for duplications. This text and above is only visiable for registered users.</small> | |||
</div> | |||
<div class="bibliography"><!-- | |||
-->[[File:Ajax-loader.gif]]<!-- | |||
--><div class="bibliography-data" style="display:none"><!-- | |||
-->{{#tag:nowiki|{{#invoke:Publications|main}}}}<!-- | |||
--></div><!-- | |||
--></div> | --></div> | ||
[[Category:Publication| ]] | [[Category:Publication| ]] |
Latest revision as of 19:57, 9 November 2021
The pubkey is usually the last name of the first author followed by the year number; add suffix for duplications. This text and above is only visiable for registered users.
@article {Scalable23,
month = {7},
url = {https://dl.acm.org/doi/pdf/10.1145/3607192},
year = {2023},
author = {Xinqiao Zhang and Mohammad Samragh and Siam Hussain and Ke Huang and Farinaz Koushanfar},
publisher = {ACM Transactions on Embedded Computing Systems},
title = {Scalable Binary Neural Network applications in Oblivious Inference},
_pageName = {Scalable23}
}
@article {Swnet2021,
month = {12},
url = {https://ieeexplore.ieee.org/abstract/document/9600865},
year = {2021},
author = {Mojan Javaheripi and Bita Darvish Rouhani and Farinaz Koushanfar},
publisher = {IEEE Journal on Emerging and Selected Topics in Circuits and Systems},
title = {SWANN: Small-World Architecture for Fast Convergence of Neural Networks},
pdf = {SWANN 2021.pdf},
_pageName = {Swnet2021}
}
@article {Autorank2021,
month = {12},
url = {https://ieeexplore.ieee.org/abstract/document/9611209},
year = {2021},
author = {Mojan Javaheripi and Mohammad Samragh and Farinaz Koushanfar},
publisher = {IEEE Journal on Emerging and Selected Topics in Circuits and Systems},
title = {AutoRank: Automated Rank Selection for Effective Neural Network Customization},
pdf = {AutoRank 2021.pdf},
_pageName = {Autorank2021}
}
@conference {Hussain2021,
month = {11},
url = {https://dl.acm.org/doi/10.1145/3460120.3484797},
year = {2021},
author = {Siam Umar Hussain and Mojan Javaheripi and Mohammad Samragh and Farinaz Koushanfar},
publisher = {ACM SIGSAC Conference on Computer and Communications Security (CCS)},
title = {COINN: Crypto/ML Codesign for Oblivious Inference via Neural Networks},
pdf = {COINN cameraReady.pdf},
_pageName = {Hussain2021}
}
@conference {Hashtag2021,
month = {11},
url = {https://ieeexplore.ieee.org/abstract/document/9643556},
year = {2021},
author = {Mojan Javaheripi and Farinaz Koushanfar},
publisher = {IEEE/ACM International Conference On Computer Aided Design (ICCAD)},
title = {HASHTAG: Hash Signatures for Online Detection of Fault-Injection Attacks on Deep Neural Networks},
pdf = {Hashtag 2021.pdf},
_pageName = {Hashtag2021}
}
@conference {Chen2021DTRAP,
month = {10},
year = {2021},
author = {Huili Chen and Cheng Fu and Jishen Zhao and Farinaz Koushanfar},
publisher = {ACM Digital Threats: Research and Practice (DTRAP)},
title = {GALU: A Genetic Algorithm Framework for Logic Unlocking. ACM Digital Threats: Research and Practice (DTRAP)},
pdf = {2021DTRAP GALU CamVer.pdf},
_pageName = {Chen2021DTRAP}
}
@inproceedings {Hussain2021USENIX,
isbn = {978-1-939133-24-3},
booktitle = {30th {USENIX} Security Symposium ({USENIX} Security 21)},
month = {8},
url = {https://www.usenix.org/conference/usenixsecurity21/presentation/hussain},
pages = {2273--2290},
year = {2021},
author = {Shehzeen Hussain and Paarth Neekhara and Shlomo Dubnov and Julian McAuley and Farinaz Koushanfar},
journal = {USENIX Security},
publisher = {USENIX Association},
title = {WaveGuard: Understanding and Mitigating Audio Adversarial Examples},
pdf = {Usenixsec21-hussain.pdf},
_pageName = {Hussain2021USENIX}
}
@inproceedings {Javaheripi2021XCL,
month = {6},
year = {2021},
author = {Greg Fields and Mohammad Samragh and Mojan Javaheripi and Farinaz Koushanfar and Tara Javidi},
publisher = {IEEE/CVF International Conference on Computer Vision Workshops (ICCVW)},
title = {Trojan Signatures in DNN Weights},
pdf = {Fields Trojan Signatures.pdf},
_pageName = {Javaheripi2021XCL}
}
@inproceedings {WACV2021,
month = {1},
url = {https://openaccess.thecvf.com/content/WACV2021/html/Hussain_Adversarial_Deepfakes_Evaluating_Vulnerability_of_Deepfake_Detectors_to_Adversarial_Examples_WACV_2021_paper.html},
year = {2021},
author = {Hussain, Shehzeen and Neekhara, Paarth and Jere, Malhar and Koushanfar, Farinaz and McAuley, Julian},
publisher = {IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)},
title = {Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples},
_pageName = {WACV2021}
}
@proceedings {Mohammad2021CVPR,
url = {https://openaccess.thecvf.com/content/CVPR2021W/BiVision/papers/Samragh_On_the_Application_of_Binary_Neural_Networks_in_Oblivious_Inference_CVPRW_2021_paper.pdf},
year = {2021},
author = {Mohammad Samragh and Siam Hussain and Xinqiao Zhang and Ke Huang and Farinaz Koushanfar},
publisher = {Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition},
title = {On the Application of Binary Neural Networks in Oblivious Inference},
pdf = {Samragh On the Application of Binary Neural Networks in Oblivious Inference CVPRW 2021 paper.pdf},
_pageName = {Mohammad2021CVPR}
}
@conference {Chen2021ICCV,
url = {https://openaccess.thecvf.com/content/ICCV2021/html/Chen_ProFlip_Targeted_Trojan_Attack_With_Progressive_Bit_Flips_ICCV_2021_paper.html},
year = {2021},
author = {Huili Chen and Cheng Fu and Jishen Zhao and Farinaz Koushanfar},
publisher = {International Conference on Computer Vision (ICCV)},
title = {ProFlip: Targeted Trojan Attack with Progressive Bit Flips. International Conference on Computer Vision (ICCV)},
pdf = {2021ICCV_ProFlip_CamVer.pdf},
_pageName = {Chen2021ICCV}
}
@inproceedings {Hussain2020adversarial,
booktitle = {IEEE Winter Conference on Applications of Computer Vision (WACV)},
month = {11},
url = {https://openaccess.thecvf.com/content/WACV2021/html/Hussain_Adversarial_Deepfakes_Evaluating_Vulnerability_of_Deepfake_Detectors_to_Adversarial_Examples_WACV_2021_paper.html},
doi = {10.1109/WACV48630.2021.00339},
year = {2020},
author = {Hussain, Shehzeen and Neekhara, Paarth and Malhar Jere and Farinaz Koushanfar and McAuley, Julian},
publisher = {IEEE Computer Society},
title = {Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples},
organization = {IEEE Computer Society},
pdf = {Hussain2020adversarial.pdf},
_pageName = {Hussain2020adversarial}
}
@inproceedings {Javaheripi2020cleann,
booktitle = {International Conference On Computer Aided Design},
month = {11},
url = {Deep Learning, Trojan Attack, AI Robustness, Embedded Systems, Sparse Recovery},
doi = {10.1145/3400302.3415671},
year = {2020},
author = {Mojan Javaheripi and Mohammad Samragh and Gregory Fields and Javidi, Tara and Farinaz Koushanfar},
publisher = {ACM},
title = {CLEANN: Accelerated Trojan Shield for Embedded Neural Networks},
organization = {ACM},
pdf = {Javaheripi2020cleann.pdf},
_pageName = {Javaheripi2020cleann}
}
@article {Samragh2020,
month = {10},
issn = {1539-9087},
url = {https://dl.acm.org/doi/abs/10.1145/3391901},
doi = {10.1145/3391901},
year = {2020},
volume = {19},
author = {Mohammad Samragh and Mojan Javaheripi and Farinaz Koushanfar},
journal = {ACM Transactions on Embedded Computing Systems (TECS)},
title = {EncoDeep: Realizing Bit-Flexible Encoding for Deep Neural Networks},
pdf = {Samragh2020.pdf},
_pageName = {Samragh2020}
}
@conference {Chen2020specmark,
month = {10},
year = {2020},
author = {Huili Chen and Bita Darvish Rouhani and Farinaz Koushanfar},
journal = {INTERSPEECH},
title = {SpecMark: A Spectral Watermarking Framework for IP Protection of Speech Recognition Systems},
address = {Shanghai, China},
pdf = {Chen2020specmark.pdf},
_pageName = {Chen2020specmark}
}
@inproceedings {Hussain2020,
booktitle = {Workshop on Privacy-Preserving Machine Learning in Practice (PPMLP{\textquoteright}20)},
month = {9},
doi = {10.1145/3411501.3419433},
year = {2020},
author = {Siam U. Hussain and Baiyu Li and F. Koushanfar and Rosario Cammarota},
publisher = {ACM},
title = {TinyGarble2: Smart, Efficient, and Scalable Yao{\textquoteright}s Garble Circuit},
address = {Virtual},
organization = {ACM},
pdf = {Hussain2020.pdf},
_pageName = {Hussain2020}
}
@article {Rouhani2017curtail,
month = {9},
url = {https://ieeexplore.ieee.org/abstract/document/9197614},
year = {2020},
author = {Mojan Javaheripi and Mohammad Samragh and Bita Darvish Rouhani and Tara Javidi and Farinaz Koushanfar},
publisher = {IEEE Transactions on Dependable and Secure Computing},
title = {CuRTAIL: ChaRacterizing and Thwarting AdversarIal Deep Learning},
pdf = {CuRTAIL 2020.pdf},
_pageName = {Rouhani2017curtail}
}
@inproceedings {Chen2020ahec,
booktitle = {Design Automation Conference (DAC)},
month = {7},
year = {2020},
author = {Huili Chen and Rosario Cammarota and Felipe Valencia and Francesco Regazzoni and Farinaz Koushanfar},
title = {AHEC: End-to-end Compiler Framework for Privacy-preserving Machine Learning Acceleration},
address = {Virtual event},
pdf = {Chen2020ahec.pdf},
_pageName = {Chen2020ahec}
}
@inproceedings {Chen2020flowtrojan,
booktitle = {IEEE International NEWCAS Conference},
month = {6},
year = {2020},
author = {Huili Chen and Seetal Potluri and Farinaz Koushanfar},
title = {FlowTrojan: Insertion and Detection of Hardware Trojans on Flow-Based Microfluidic Biochips},
pdf = {Chen2020flowtrojan.pdf},
_pageName = {Chen2020flowtrojan}
}
@article {Adans2020,
month = {5},
url = {https://ieeexplore.ieee.org/abstract/document/9086078},
year = {2020},
author = {Mojan Javaheripi and Mohammad Samragh and Tara Javidi and Farinaz Koushanfar},
publisher = {IEEE Journal of Selected Topics in Signal Processing (JSTSP)},
title = {AdaNS: Adaptive Non-Uniform Sampling for Automated Design of Compact DNNs},
pdf = {AdaNS 2020.pdf},
_pageName = {Adans2020}
}
@article {Chen2020,
month = {4},
url = {https://dl.acm.org/doi/10.1145/3382127},
year = {2020},
volume = {25},
author = {Huili Chen and Seetal Potluri and Farinaz Koushanfar},
journal = {ACM Transactions on Design Automation of Electronic Systems (TODAES)},
title = {Security of Microfluidic Biochip: Practical Attacks and Countermeasures},
pdf = {Chen2020.pdf},
_pageName = {Chen2020}
}
@inproceedings {Javaheripi2020,
booktitle = {Genetic and Evolutionary Computation Conference (GECCO)},
url = {https://doi.org/10.1145/3377930.3390226},
year = {2020},
author = {Mojan Javaheripi and Mohammad Samragh and Javidi, Tara and Farinaz Koushanfar},
title = {GeneCAI: Genetic Evolution for Acquiring Compact AI},
pdf = {Javaheripi2020.pdf},
_pageName = {Javaheripi2020}
}
@article {Riazi2019deep,
month = {12},
year = {2019},
author = {M. Sadegh Riazi and Bita Darvish Rouhani and Farinaz Koushanfar},
journal = {IEEE Security and Privacy (S\&P) Magazine},
title = {Deep Learning on Private Data},
pdf = {Riazi2019deep.pdf},
_pageName = {Riazi2019deep}
}
@inproceedings {Hussain2019fastwave,
booktitle = {IEEE/ACM 2019 International Conference On Computer Aided Design (ICCAD)},
month = {11},
url = {https://ieeexplore.ieee.org/document/8942122},
doi = {10.1109/ICCAD45719.2019.8942122},
year = {2019},
author = {Hussain, Shehzeen and Mojan Javaheripi and Neekhara, Paarth and Kastner, Ryan and Farinaz Koushanfar},
publisher = {ACM/SIGDA},
title = {FastWave: Accelerating Autoregressive Convolutional Neural Networks on FPGA},
address = {Colorado, USA},
organization = {ACM/SIGDA},
_pageName = {Hussain2019fastwave}
}
@article {Javaheripi2019peeking,
month = {11},
pages = {23-28},
year = {2019},
volume = {11},
author = {Mojan Javaheripi and Mohammad Samragh and Farinaz Koushanfar},
journal = {IEEE Solid-State Circuits Magazine},
title = {Peeking Into the Black Box: A Tutorial on Automated Design Optimization and Parameter Search},
pdf = {Javaheripi2019peeking.pdf},
_pageName = {Javaheripi2019peeking}
}
@inproceedings {Neekhara2019,
booktitle = {2019 Conference on Empirical Methods in Natural Language Processing (EMNLP) and 9th International Joint Conference on Natural Language Processing (IJCNLP)},
month = {11},
url = {https://www.aclweb.org/anthology/D19-1525/},
doi = {10.18653/v1/D19-1525},
year = {2019},
author = {Neekhara, Paarth and Hussain, Shehzeen and Dubnov, Shlomo and Farinaz Koushanfar},
publisher = {ACM},
title = {Adversarial Reprogramming of Text Classification Neural Networks},
address = {Hong Kong, China},
organization = {ACM},
pdf = {Neekhara2019.pdf},
_pageName = {Neekhara2019}
}
@conference {Semihd2019,
month = {11},
url = {https://ieeexplore.ieee.org/xpl/conhome/8931666/proceeding},
year = {2019},
author = {Mohsen Imani and Samuel Bosch and Mojan Javaheripi and Bita Rouhani and Xinyu Wu and Farinaz Koushanfar and Tajana Rosing},
publisher = {IEEE/ACM International Conference on Computer-Aided Design (ICCAD)},
title = {SemiHD: Semi-Supervised Learning Using Hyperdimensional Computing},
pdf = {Iccad19 semi-supervised.pdf},
_pageName = {Semihd2019}
}
@inproceedings {Chatterjee2019,
booktitle = {ACM CCS},
month = {11},
year = {2019},
author = {Rahul Chatterjee and M. Sadegh Riazi and Tanmoy Chowdhury and Emanuela Marasco and Farinaz Koushanfar and Ari Juels},
publisher = {ACM},
title = {Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms},
organization = {ACM},
pdf = {Chatterjee2019.pdf},
_pageName = {Chatterjee2019}
}
@conference {Chen2019genunlock,
month = {11},
year = {2019},
author = {Huili Chen and Cheng Fu and Jishen Zhao and Farinaz Koushanfar},
journal = {International Conference On Computer Aided Design (ICCAD)},
title = {GenUnlock: An Automated Genetic Algorithm Framework forUnlocking Logic Encryption},
address = {Westminster, CO},
pdf = {Chen2019genunlock.pdf},
_pageName = {Chen2019genunlock}
}
@inproceedings {Hussain2019universal,
booktitle = {INTERSPEECH 2019},
month = {9},
url = {https://www.isca-speech.org/archive/Interspeech_2019/abstracts/1353.html},
doi = {10.21437/Interspeech.2019-1353},
year = {2019},
author = {Hussain, Shehzeen and Neekhara, Paarth and Pandey, Prakhar and Dubnov, Shlomo and McAuley, Julian and Farinaz Koushanfar},
publisher = {International Speech Communication Association (ISCA)},
title = {Universal Adversarial Perturbations for Speech Recognition Systems},
address = {Graz, Austria},
organization = {International Speech Communication Association (ISCA)},
pdf = {Hussain2019universal.pdf},
_pageName = {Hussain2019universal}
}
@inproceedings {Imani2019,
booktitle = {IEEE Cloud Computing (CLOUD)},
month = {8},
year = {2019},
author = {Mohsen Imani and Yeseong Kim and M. Sadegh Riazi and John Messerly and Patric Liu and Farinaz Koushanfar and Tajana Rosing},
publisher = {IEEE},
title = {A Framework for Collaborative Learning in Secure High-Dimensional Space},
organization = {IEEE},
_pageName = {Imani2019}
}
@inproceedings {Chen2019deepinspect,
booktitle = {International Joint Conference on Artificial Intelligence (IJCAI)},
month = {8},
year = {2019},
author = {Huili Chen and Cheng Fu and Jishen Zhao and Farinaz Koushanfar},
title = {DeepInspect: A Black-box Trojan Detection and Mitigation Framework for Deep Neural Networks},
address = {Macao, China},
pdf = {Chen2019deepinspect.pdf},
_pageName = {Chen2019deepinspect}
}
@inproceedings {Javaheripi2019,
booktitle = {6th ICML Workshop on Automated Machine Learning},
month = {6},
year = {2019},
author = {Mojan Javaheripi and Mohammad Samragh and Javidi, Tara and Farinaz Koushanfar},
title = {ASCAI: Adaptive Sampling for acquiring Compact AI},
pdf = {Javaheripi2019.pdf},
_pageName = {Javaheripi2019}
}
@inproceedings {Chen2019deepattest,
booktitle = {International Symposium on Computer Architecture (ISCA)},
month = {6},
year = {2019},
author = {Huili Chen and Cheng Fu and Bita Darvish Rouhani and Jishen Zhao and Farinaz Koushanfar},
title = {DeepAttest: An End-to-End Attestation Framework for Deep Neural Networks},
pdf = {Chen2019deepattest.pdf},
_pageName = {Chen2019deepattest}
}
@inproceedings {Riazi2019,
booktitle = {USENIX Security},
month = {5},
url = {https://arxiv.org/pdf/1902.07342.pdf},
year = {2019},
author = {M. Sadegh Riazi and Mohammad Samragh and Hao Chen and Kim Laine and Kristin Lauter and Farinaz Koushanfar},
publisher = {USENIX},
title = {XONN: XNOR-based Oblivious Deep Neural Network Inference},
organization = {USENIX},
pdf = {Riazi2019.pdf},
_pageName = {Riazi2019}
}
@inproceedings {Riazi2019mpcircuits,
booktitle = {Hardware Oriented Security and Trust (HOST)},
month = {5},
url = {https://eprint.iacr.org/2019/275.pdf},
year = {2019},
author = {M. Sadegh Riazi and Mojan Javaheripi and Siam U. Hussain and Farinaz Koushanfar},
publisher = {IEEE},
title = {MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation},
organization = {IEEE},
pdf = {Riazi2019mpcircuits.pdf},
_pageName = {Riazi2019mpcircuits}
}
@inproceedings {Rouhani2019,
booktitle = {Architectural Support for Programming Languages and Operating Systems (ASPLOS)},
month = {4},
year = {2019},
author = {Bita Darvish Rouhani and Huili Chen and Farinaz Koushanfar},
title = {DeepSigns: An End-to-End Watermarking Framework for Protecting the Ownership of Deep Neural Networks},
pdf = {Rouhani2019.pdf},
_pageName = {Rouhani2019}
}
@inproceedings {Hussain2019fase,
booktitle = {Field-Programmable Custom Computing Machines (FCCM)},
month = {4},
year = {2019},
author = {Siam U. Hussain and Farinaz Koushanfar},
title = {FASE: FPGA Acceleration of Secure Function Evaluation},
address = {San Diego},
pdf = {Hussain2019fase.pdf},
_pageName = {Hussain2019fase}
}
@inproceedings {Songhori2019,
booktitle = {Design Automation Conference (DAC)},
month = {3},
url = {https://arxiv.org/pdf/1902.02908.pdf},
year = {2019},
author = {Songhori, Ebrahim M. and M. Sadegh Riazi and Siam U. Hussain and Ahmad-Reza Sadeghi and Farinaz Koushanfar},
title = {ARM2GC: Succinct Garbled Processor for Secure Computation},
pdf = {Songhori2019.pdf},
_pageName = {Songhori2019}
}
@article {Hussain2019,
year = {2019},
author = {Siam U. Hussain and M. Sadegh Riazi and Farinaz Koushanfar},
journal = {Preprint},
title = {The Fusion of Secure Function Evaluation and Logic Synthesis},
pdf = {Hussain2019.pdf},
_pageName = {Hussain2019}
}
@conference {Chen2019,
year = {2019},
author = {Huili Chen and Bita Darvish Rouhani and Cheng Fu and Jishen Zhao and Farinaz Koushanfar},
journal = {ACM International Conference on Multimedia Retrieval (ICMR)},
publisher = {ACM},
title = {DeepMarks: A Secure Fingerprinting Framework for Digital Rights Management of Deep Learning Models},
pdf = {Chen2019.pdf},
_pageName = {Chen2019}
}
@article {Rouhani2018redcrypt,
month = {12},
url = {https://dl.acm.org/citation.cfm?id=3242899},
year = {2018},
author = {Rouhani, Bita D and Siam U. Hussain and Kristin Lauter and Farinaz Koushanfar},
journal = {ACM Transactions on Reconfigurable Technology and Systems (TRETS) - Special Issue on Deep learning on FPGAs},
title = {ReDCrypt: Real-Time Privacy-Preserving Deep Learning Inference in Clouds Using FPGAs},
_pageName = {Rouhani2018redcrypt}
}
@article {Hussain2018p3,
month = {9},
doi = {https://doi.org/10.1145/3236625},
year = {2018},
volume = {23},
author = {Siam U. Hussain and Farinaz Koushanfar},
journal = {ACM Transactions on Design Automation of Electronic Systems (TODAES)},
title = {P3: Privacy Preserving Positioning for Smart Automotive Systems},
pdf = {Hussain2018p3.pdf},
_pageName = {Hussain2018p3}
}
@article {Hussain2018shaip,
month = {9},
doi = {10.1145/3274669},
year = {2018},
volume = {23},
author = {Siam U. Hussain and M. Sadegh Riazi and Farinaz Koushanfar},
journal = {ACM Transactions on Design Automation of Electronic Systems (TODAES)},
title = {SHAIP: Secure Hamming Distance for Authentication of Intrinsic PUFs},
pdf = {Hussain2018shaip.pdf},
_pageName = {Hussain2018shaip}
}
@inproceedings {Hussain2018,
isbn = {978-1-4503-5700-5},
booktitle = {Design Automation Conference (DAC)},
month = {6},
url = {https://dl.acm.org/citation.cfm?id=3196074},
doi = {10.1145/3195970.3196074},
year = {2018},
author = {Siam U. Hussain and Bita Darvish Rouhani and Mohammad Ghasemzadeh and Farinaz Koushanfar},
publisher = {ACM},
title = {MAXelerator: FPGA Accelerator for Privacy Preserving Multiply-Accumulate (MAC) on Cloud Servers},
address = {San Fransisco},
organization = {ACM},
pdf = {Hussain2018.pdf},
_pageName = {Hussain2018}
}
@inproceedings {Riazi2018,
booktitle = {ASIACCS},
month = {3},
year = {2018},
author = {M. Sadegh Riazi and Christian Weinert and Oleksandr Tkachenko and Songhori, Ebrahim M. and Thomas Schneider and Farinaz Koushanfar},
publisher = {ACM},
title = {Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications},
organization = {ACM},
pdf = {Riazi2018.pdf},
_pageName = {Riazi2018}
}
@article {Rouhani2018,
year = {2018},
author = {Bita Rouhani and Mohammad Samragh and Javidi, Tara and Farinaz Koushanfar},
journal = {To appear in IEEE Security and Privacy (S\&P) Magazine},
title = {Safe Machine Learning and Defeating Adversarial Attacks},
pdf = {Rouhani2018.pdf},
_pageName = {Rouhani2018}
}
@inproceedings {Rouhani2018causalearn,
booktitle = {International Symposium on Field-Programmable Gate Arrays (FPGA {\textquoteright}18)},
year = {2018},
author = {Rouhani, Bita D and Mohammad Ghasemzadeh and Farinaz Koushanfar},
publisher = {ACM/SIGDA},
title = {CausaLearn: Automated Framework for Scalable Streaming-based Causal Bayesian Learning using FPGAs},
organization = {ACM/SIGDA},
pdf = {Rouhani2018causalearn.pdf},
_pageName = {Rouhani2018causalearn}
}
@inproceedings {Rouhani2018deepfense,
booktitle = {ICCAD},
url = {https://arxiv.org/abs/1709.02538},
year = {2018},
author = {Bita Rouhani and Mohammad Samragh and Mojan Javaheripi and Farinaz Koushanfar and Javidi, Tara},
title = {DeepFense: Online Accelerated Defense Against Adversarial Deep Learning},
_pageName = {Rouhani2018deepfense}
}
@inproceedings {Rouhani2018deepsigns,
year = {2018},
author = {Bita Rouhani and Huili Chen and Farinaz Koushanfar},
title = {DeepSigns: A Generic Watermarking Framework for IP Protection of Deep Learning Models},
_pageName = {Rouhani2018deepsigns}
}
@inproceedings {Chen2018,
url = {https://arxiv.org/abs/1804.03648},
year = {2018},
author = {Huili Chen and Bita Darvish Rouhani and Farinaz Koushanfar},
title = {DeepMarks: A Digital Fingerprinting Framework for Deep Neural Networks},
pdf = {Chen2018.pdf},
_pageName = {Chen2018}
}
@inproceedings {Ghasemzadeh2018,
booktitle = {The 26th IEEE International Symposium on Field-Programmable Custom Computing Machines},
year = {2018},
author = {Mohammad Ghasemzadeh and Mohammad Samragh and Farinaz Koushanfar},
title = {ReBNet: Residual Binarized Neural Network},
pdf = {Ghasemzadeh2018.pdf},
_pageName = {Ghasemzadeh2018}
}
@inproceedings {Chen2017,
isbn = {978-1-5386-2254-4},
booktitle = {IEEE International Conference on Computer Design (ICCD)},
month = {11},
issn = {978-1-5386-2255-1},
url = {https://ieeexplore.ieee.org/abstract/document/8119184/},
doi = {10.1109/ICCD.2017.11},
year = {2017},
author = {Huili Chen and Seetal Potluri and Farinaz Koushanfar},
publisher = {IEEE},
title = {BioChipWork: Reverse Engineering of Microfluidic Biochips},
address = {Boston, MA, USA},
organization = {IEEE},
pdf = {Chen2017.pdf},
_pageName = {Chen2017}
}
@inproceedings {Riazi2017prisearch,
booktitle = {Design Automation Conference (DAC)},
month = {5},
url = {http://sadeghr.com/wp-content/uploads/2017/06/PriSearch.pdf},
year = {2017},
author = {M. Sadegh Riazi and Songhori, Ebrahim M. and Farinaz Koushanfar},
title = {PriSearch: Efficient Search on Private Data},
address = {Austin, Texas},
_pageName = {Riazi2017prisearch}
}
@article {Rouhani2017deepsecure,
month = {5},
url = {https://arxiv.org/pdf/1705.08963},
year = {2017},
volume = {arXiv:1705.08963},
author = {Bita Darvish Rouhani and M. Sadegh Riazi and Farinaz Koushanfar},
journal = {arXiv preprint},
title = {DeepSecure: Scalable Provably-Secure Deep Learning},
_pageName = {Rouhani2017deepsecure}
}
@article {Riazi2017toward,
chapter = {62},
month = {1},
url = {https://www.degruyter.com/downloadpdf/j/popets.2017.2017.issue-1/popets-2017-0005/popets-2017-0005.pdf},
year = {2017},
volume = {2017},
author = {M. Sadegh Riazi and Songhori, Ebrahim M. and Ahmad-Reza Sadeghi and Thomas Schneider and Farinaz Koushanfar},
journal = {Proceedings on Privacy Enhancing Technologies},
title = {Toward Practical Secure Stable Matching},
pdf = {Riazi2017toward.pdf},
_pageName = {Riazi2017toward}
}
@inproceedings {Mirhoseini2017,
booktitle = {International Parallel \& Distributed Processing Symposium (IPDPS)},
year = {2017},
author = {Azalia Mirhoseini and Rouhani, Bita D and Songhori, Ebrahim M. and Farinaz Koushanfar},
publisher = {IEEE},
title = {ExtDict: Extensible Dictionaries for Data- and Platform-Aware Large-Scale Learning},
organization = {IEEE},
pdf = {Mirhoseini2017.pdf},
_pageName = {Mirhoseini2017}
}
@article {Riazi2017,
year = {2017},
author = {M. Sadegh Riazi and Mohammad Samragh and Farinaz Koushanfar},
journal = {ACM Transactions on Embedded Computing Systems (TECS)},
title = {CAMsure: Secure Content-Addressable Memory for Approximate Search},
pdf = {Riazi2017.pdf},
_pageName = {Riazi2017}
}
@article {Rouhani2017,
year = {2017},
author = {Bita Darvish Rouhani and Azalia Mirhoseini and Farinaz Koushanfar},
journal = {ACM Transactions on Embedded Computing Systems (TECS)},
title = {RISE: An Automated Framework for Real-Time Intelligent Video Surveillance on FPGA},
pdf = {Rouhani2017.pdf},
_pageName = {Rouhani2017}
}
@inproceedings {Rouhani2017deep3,
booktitle = {Design Automation Conference (DAC)},
year = {2017},
author = {Bita Dravish Rouhani and Azalia Mirhoseini and Farinaz Koushanfar},
publisher = {ACM},
title = {Deep3: Leveraging Three Levels of Parallelism for Efficient Deep Learning},
organization = {ACM},
_pageName = {Rouhani2017deep3}
}
@inproceedings {Rouhani2017tinydl,
booktitle = {International Symposium on Circuits and Systems (ISCAS)},
year = {2017},
author = {Rouhani, Bita D and Azalia Mirhoseini and Farinaz Koushanfar},
publisher = {IEEE},
title = {TinyDL: Just-In-Time Deep Learning Solution For Constrained Embedded Systems},
organization = {IEEE},
pdf = {Rouhani2017tinydl.pdf},
_pageName = {Rouhani2017tinydl}
}
@inproceedings {Samragh2017,
booktitle = {Design Automation and Test in Europe (DATE)},
year = {2017},
author = {Mohammad Samragh and Mohsen Imani and Farinaz Koushanfar and Tajana Rosing},
title = {LookNN: Neural Network with No Multiplication},
pdf = {Samragh2017.pdf},
_pageName = {Samragh2017}
}
@inproceedings {Samragh2017customizing,
booktitle = {IEEE International Symposium on Field-Programmable Custom Computing Machines (FCCM)},
year = {2017},
author = {Mohammad Samragh and Mohammad Ghasemzadeh and Farinaz Koushanfar},
publisher = {IEEE},
title = {Customizing Neural Networks for Efficient FPGA Implementation},
organization = {IEEE},
pdf = {Samragh2017customizing.pdf},
_pageName = {Samragh2017customizing}
}
@article {Riazi2016sub,
month = {11},
url = {https://arxiv.org/pdf/1612.01835.pdf},
year = {2016},
author = {M. Sadegh Riazi and Beidi Chen and Anshumali Shrivastava and Dan Wallach and Farinaz Koushanfar},
journal = {arXiv},
title = {Sub-linear Privacy-preserving Search with Untrusted Server and Semi-honest Parties},
pdf = {Riazi2016sub.pdf},
_pageName = {Riazi2016sub}
}
@mastersthesis {Riazi2016,
month = {7},
pages = {123},
year = {2016},
volume = {Master of Science},
author = {M. Sadegh Riazi},
title = {Large-Scale Privacy-Preserving Matching and Search},
school = {Rice University},
pdf = {Riazi2016.pdf},
_pageName = {Riazi2016}
}
@inproceedings {Mirhoseini2016perform,
booktitle = {Design Automation Conference (DAC)},
month = {6},
url = {dl.acm.org/citation.cfm?id=2898060},
year = {2016},
author = {Azalia Mirhoseini and Bita Darvish Rouhani and Songhori, Ebrahim M. and Farinaz Koushanfar},
title = {Perform-ML: Performance Optimized Machine Learning by Platform and Content Aware Customization},
pdf = {Mirhoseini2016perform.pdf},
_pageName = {Mirhoseini2016perform}
}
@inproceedings {Songhori2016,
booktitle = {Design Automation Conference},
month = {6},
url = {dl.acm.org/citation.cfm?id=2898027},
year = {2016},
author = {Songhori, Ebrahim M. and Shaza Zeitouni and Ghada Dessouky and T. Schneider and Ahmad-Reza Sadeghi and Farinaz Koushanfar},
title = {GarbledCPU: A MIPS Processor for Secure Computation in Hardware},
pdf = {Songhori2016.pdf},
_pageName = {Songhori2016}
}
@inproceedings {Abera2016,
booktitle = {Design Automation Conference (DAC)},
month = {6},
year = {2016},
author = {Tigist Abera and N. Asokan and Lucas Davi and Farinaz Koushanfar and Andrew Paverd and Ahmad-Reza Sadeghi and Gene Tsudik},
title = {Things, Trouble, Trust: On Building Trust in IoT Systems},
pdf = {Abera2016.pdf},
_pageName = {Abera2016}
}
@inproceedings {Hussain2016privacy,
booktitle = {Design Automation Conference (DAC)},
month = {6},
url = {http://dl.acm.org/citation.cfm?id=2898071},
year = {2016},
author = {Siam U. Hussain and Farinaz Koushanfar},
title = {Privacy Preserving Localization for Smart Automotive Systems},
pdf = {Hussain2016privacy.pdf},
_pageName = {Hussain2016privacy}
}
@inproceedings {Mirhoseini2016cryptoml,
booktitle = {IEEE International Symposium on Hardware Oriented Security and Trust(HOST)},
month = {5},
year = {2016},
author = {Azalia Mirhoseini and Ahmad-Reza Sadeghi and Farinaz Koushanfar},
title = {CryptoML: Secure Outsourcing of Big Data Machine Learning Applications},
pdf = {Mirhoseini2016cryptoml.pdf},
_pageName = {Mirhoseini2016cryptoml}
}
@inproceedings {Riazi2016genmatch,
booktitle = {IEEE International Symposium on Hardware Oriented Security and Trust(HOST)},
month = {5},
year = {2016},
author = {M. Sadegh Riazi and Neeraj K. R. Dantu and L. N. Vinay Gattu and Farinaz Koushanfar},
title = {GenMatch: Secure DNA Compatibility Testing},
pdf = {Riazi2016genmatch.pdf},
_pageName = {Riazi2016genmatch}
}
@inproceedings {Zhang2016,
booktitle = {IEEE International Symposium on Hardware Oriented Security and Trust(HOST)},
month = {5},
year = {2016},
author = {Ye Zhang and Farinaz Koushanfar},
title = {Robust Privacy-Preserving Fingerprint Authentication},
pdf = {Zhang2016.pdf},
_pageName = {Zhang2016}
}
@article {Mirhoseini2016,
month = {1},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7447819},
year = {2016},
volume = {2},
author = {Azalia Mirhoseini and Bita Darvish Rouhani and Songhori, Ebrahim M. and Farinaz Koushanfar},
journal = {IEEE Transactions on Multi-Scale Computing Systems (TMSCS)},
title = {Chime: Checkpointing long computations on intermittently energized IoT devices},
pdf = {Mirhoseini2016.pdf},
_pageName = {Mirhoseini2016}
}
@article {Hussain2016,
chapter = {1-1},
month = {1},
issn = {2332-7766},
url = {http://ieeexplore.ieee.org/xpl/abstractKeywords.jsp?tp=\&arnumber=7387751},
doi = {10.1109/TMSCS.2016.2519902},
year = {2016},
volume = {2},
author = {Siam U. Hussain and Mehrdad Majzoobi and Farinaz Koushanfar},
journal = {IEEE Transactions on Multi-Scale Computing Systems},
title = {A Built-In-Self-Test Scheme for Online Evaluation of Physical Unclonable Functions and True Random Number Generators},
pdf = {Hussain2016.pdf},
_pageName = {Hussain2016}
}
@inproceedings {Rouhani2016,
booktitle = {Proceedings of the Eleventh IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis},
year = {2016},
author = {Rouhani, Bita D and Azalia Mirhoseini and Farinaz Koushanfar},
title = {Going deeper than deep learning for massive data analytics under physical constraints},
pdf = {Rouhani2016.pdf},
_pageName = {Rouhani2016}
}
@article {Rouhani2016automated,
year = {2016},
author = {Rouhani, Bita D and Azalia Mirhoseini and Songhori, Ebrahim M. and Farinaz Koushanfar},
journal = {ACM Transactions on Reconfigurable Technology and Systems (TRETS)},
title = {Automated Real-Time Analysis of Streaming Big and Dense Data on Reconfigurable Platforms},
pdf = {Rouhani2016automated.pdf},
_pageName = {Rouhani2016automated}
}
@inproceedings {Rouhani2016delight,
isbn = {978-1-4503-4185-1/16/08},
booktitle = {International Symposium on Low Power Electronics and Design (ISLPED)},
doi = {http://dx.doi.org/10.1145/2934583.2934599},
year = {2016},
author = {Bita Darvish Rouhani and Azalia Mirhoseini and Farinaz Koushanfar},
publisher = {ACM},
title = {DeLight: Adding Energy Dimension To Deep Neural Networks},
address = {San Francisco},
organization = {ACM},
pdf = {Rouhani2016delight.pdf},
_pageName = {Rouhani2016delight}
}
@inproceedings {Kahevo2015,
booktitle = {IEEE/ACM International Conference on Computer-Aided Design (ICCAD)},
month = {11},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7372577},
doi = {10.1109/ICCAD.2015.7372577},
year = {2015},
author = {A. B. Kahng and F. Koushanfar},
title = {Evolving EDA Beyond its E-Roots: An Overview},
pdf = {Kahevo2015.pdf},
_pageName = {Kahevo2015}
}
@inproceedings {Koudas2015,
booktitle = {IEEE/ACM International Conference on Computer-Aided Design (ICCAD)},
month = {11},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7372578},
doi = {10.1109/ICCAD.2015.7372578},
year = {2015},
author = {F. Koushanfar and A. Mirhoseini and G. Qu and Z. Zhang},
title = {DA Systemization of Knowledge: A Catalog of Prior Forward-Looking Initiatives},
pdf = {Koudas2015.pdf},
_pageName = {Koudas2015}
}
@article {Chung2015,
month = {8},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6977972},
doi = {10.1109/TC.2014.2378291},
year = {2015},
volume = {64},
author = {S. Chung and J. Kong and F. Koushanfar},
journal = {IEEE Transactions on Computers},
title = {An Energy-efficient Last-level Cache Architecture for Process Variation-tolerant 3D Microprocessors},
pdf = {Chung2015.pdf},
_pageName = {Chung2015}
}
@conference {Demaut2015,
month = {8},
url = {http://dl.acm.org/citation.cfm?id=2813678},
doi = {10.1145/2810103.2813678},
year = {2015},
author = {Demmler, D. and G. Dessouky and F. Koushanfar and Sadeghi, A. and T. Schneider and S. Zeitouni},
journal = {Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security},
title = {Automated Synthesis of Optimized Circuits for Secure Computation},
pdf = {Demaut2015.pdf},
_pageName = {Demaut2015}
}
@inproceedings {Songhori2015,
booktitle = {Design Automation Conference (DAC)},
month = {6},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7167220\&tag=1},
doi = {10.1145/2744769.2744808},
year = {2015},
author = {E. Songhori and Siam U. Hussain and Ahmad-Reza Sadeghi and F. Koushanfar},
title = {Compacting privacy-preserving k-nearest neighbor search using logic synthesis},
pdf = {Songhori2015.pdf},
_pageName = {Songhori2015}
}
@inproceedings {Rouhani2015,
booktitle = {23rd IEEE Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM)},
month = {5},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7160069},
doi = {10.1109/FCCM.2015.56},
year = {2015},
author = {B. Rouhani and E. Songhori and A. Mirhoseini and F. Koushanfar},
title = {SSketch: An Automated Framework for Streaming Sketch-based Analysis of Big Data on FPGA},
pdf = {Rouhani2015.pdf},
_pageName = {Rouhani2015}
}
@inproceedings {Songhori2015tinygarble,
booktitle = {IEEE Symposium on Security and Privacy (S\&P)(14\% acceptance rate)},
month = {5},
url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7163039},
doi = {10.1109/SP.2015.32},
year = {2015},
author = {E. Songhori and Siam U. Hussain and Ahmad-Reza Sadeghi and T. Schneider and F. Koushanfar},
title = {TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits},
pdf = {Songhori2015tinygarble.pdf},
_pageName = {Songhori2015tinygarble}
}
@inproceedings {Miettinen2015,
booktitle = {AsiaCCS 2015 (17\% acceptance rate for full papers)},
month = {4},
url = {http://dl.acm.org/citation.cfm?id=2714634},
doi = {10.1145/2714576.2714634},
year = {2015},
author = {Markus Miettinen and Majid Sobhani and Thien Duc Nguyen and Jon Rios and Sudha Yellapantula and N. Asokan and Ahmad-Reza Sadeghi and Farinaz Koushanfar},
title = {I Know Where You are: Proofs of Presence Resilient to Malicious Provers},
pdf = {Miettinen2015.pdf},
_pageName = {Miettinen2015}
}
@article {Mirhoseini2015phase,
month = {3},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7048065},
doi = {10.1109/JETCAS.2015.2398211},
year = {2015},
volume = {5},
author = {A. Mirhoseini and M. Potkonjak and F. Koushanfar},
journal = {IEEE Journal on Emerging and Selected Topics in Circuits and Systems (JETCAS), Special Issue on Computing in Emerging Technologies},
title = {Phase Change Memory Write Cost Minimization by Data Encoding},
pdf = {Mirhoseini2015phase.pdf},
_pageName = {Mirhoseini2015phase}
}
@inproceedings {Songhori2015ahead,
booktitle = {IEEE/ACM Design, Automation \& Test in Europe (DATE)},
month = {3},
url = {http://dl.acm.org/citation.cfm?id=2757032},
year = {2015},
author = {E. Songhori and A. Mirhoseini and F. Koushanfar},
title = {AHEAD: Automated Framework for Hardware Accelerated Iterative Data Analysis},
pdf = {Songhori2015ahead.pdf},
_pageName = {Songhori2015ahead}
}
@inproceedings {Mirhoseini2015,
booktitle = {ACM SIGMETRICS Performance Evaluation Review},
year = {2015},
author = {Azalia Mirhoseini and Songhori, Ebrahim M. and Rouhani, Bita D and Farinaz Koushanfar},
title = {Flexible Transformations For Learning Big Data},
pdf = {Mirhoseini2015.pdf},
_pageName = {Mirhoseini2015}
}
@article {Nowroz2014,
month = {12},
issn = {1937-4151},
url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true\&arnumber=6951867},
pages = {1792-1805},
doi = {10.1109/TCAD.2014.2354293},
year = {2014},
volume = {33},
author = {Abdullah Nazma Nowroz and Kangqiao Hu and Farinaz Koushanfar and Sherief Reda},
journal = {IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems},
title = {Novel Techniques for High-Sensitivity Hardware Trojan Detection Using Thermal and Power Maps},
pdf = {Nowroz2014.pdf},
_pageName = {Nowroz2014}
}
@inproceedings {Shahrjerdi2014,
booktitle = {International Conference on Computer-Aided Design},
month = {11},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7001348},
year = {2014},
author = {Davood Shahrjerdi and Jeyavijayan Rajendran and Siddharth Garg and Farinaz Koushanfar and Ramesh Karri},
title = {Shielding and Securing Integrated Circuits with Sensors},
pdf = {Shahrjerdi2014.pdf},
_pageName = {Shahrjerdi2014}
}
@inproceedings {Hussain2014,
booktitle = {International Conference on Computer-Aided Design},
month = {11},
url = {dl.acm.org/citation.cfm?id=2691400},
year = {2014},
author = {Siam U. Hussain and Sudha Yellapantula and Mehrdad Majzoobi and Farinaz Koushanfar},
title = {BIST-PUF: Online, Hardware-based Evaluation of Physically Unclonable Circuit Identifiers},
pdf = {Hussain2014.pdf},
_pageName = {Hussain2014}
}
@article {Karri2014,
month = {8},
issn = {1558-2256},
pages = {1123-1125},
doi = {10.1109/JPROC.2014.2334837},
year = {2014},
volume = {102},
author = {Ramesh Karri and Farinaz Koushanfar},
journal = {Proceedings of the IEEE},
title = {Trustworthy Hardware},
pdf = {Karri2014.pdf},
_pageName = {Karri2014}
}
@article {Rostami2014a,
month = {8},
url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6860363},
doi = {10.1109/JPROC.2014.2335155},
year = {2014},
volume = {102},
author = {Masoud Rostami and Farinaz Koushanfar and Ramesh Karri},
journal = {Proceedings of the IEEE},
title = {A Primer on Hardware Security: Models, Methods, and Metrics},
pdf = {Rostami2014a.pdf},
_pageName = {Rostami2014a}
}
@article {Herder2014,
month = {8},
issn = {1558-2256},
url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6823677},
pages = {1126 - 1141},
doi = {10.1109/JPROC.2014.2320516},
year = {2014},
volume = {102},
author = {Herder, Charles and Yu, Meng-Day and Farinaz Koushanfar and Srinivas Devadas},
journal = {Proceedings of the IEEE},
title = {Physical Unclonable Functions and Applications: A Tutorial},
pdf = {Herder2014.pdf},
_pageName = {Herder2014}
}
@inproceedings {Kong2014,
booktitle = {Design Automation Conference (DAC), Best paper candidate},
month = {6},
url = {http://dl.acm.org/citation.cfm?id=2593192},
year = {2014},
author = {Kong, Joonho and Farinaz Koushanfar and Praveen K. Pendyala and Ahmad-Reza Sadeghi and Christian Wachsmann},
title = {PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs},
pdf = {Kong2014.pdf},
_pageName = {Kong2014}
}
@inproceedings {Wendt2014,
isbn = {9781450327305},
booktitle = {Design Automation Conference (DAC)},
month = {6},
url = {dl.acm.org/citation.cfm?id=2593228},
pages = {1 - 6},
doi = {10.1145/2593069.2593228},
year = {2014},
author = {James B. Wendt and Farinaz Koushanfar and Potkonjak, Miodrag},
title = {Techniques for Foundry Identification},
pdf = {Wendt2014.pdf},
_pageName = {Wendt2014}
}
@inproceedings {Munir2014d2cyber,
booktitle = {Design, Automation \& Test in Europe (DATE)},
month = {3},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6800272},
year = {2014},
author = {Arslan Munir and Farinaz Koushanfar},
title = {D2Cyber: A Design Automation Tool for Dependable Cybercars},
pdf = {Munir2014d2cyber.pdf},
_pageName = {Munir2014d2cyber}
}
@conference {Rostami2014quo,
month = {3},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6800566},
year = {2014},
author = {Masoud Rostami and James B. Wendt and Potkonjak, Miodrag and Farinaz Koushanfar},
journal = {Design, automation, and test in Europe (DATE)},
title = {Quo Vadis, PUF? Trends and Challenges of Emerging Physical-Disorder based Security},
address = {Dresden},
pdf = {Rostami2014quo.pdf},
_pageName = {Rostami2014quo}
}
@article {Munir2014,
number = {1},
month = {1},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6081397},
pages = {1872-1890},
year = {2014},
volume = {74},
author = {Arslan Munir and Ann Gordon-Ross and Sanjay Ranka and Farinaz Koushanfar},
journal = {Elsevier Journal of Parallel and Distributed Computing (JPDC)},
title = {A Queueing Theoretic Approach for Performance Evaluation of Low-Power Multi-core Embedded Systems},
pdf = {Munir2014.pdf},
_pageName = {Munir2014}
}
@article {Rostami2014,
month = {1},
url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=\&arnumber=6714458},
year = {2014},
volume = {2},
author = {Masoud Rostami and Mehrdad Majzoobi and Farinaz Koushanfar and Dan Wallach and Srini Devadas},
journal = {IEEE Transactions on Emerging Topics in Computing},
title = {Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching},
pdf = {Rostami2014.pdf},
_pageName = {Rostami2014}
}
@article {Farinaz2013Power,
month = {12},
url = {https://eprint.iacr.org/2013/851},
year = {2013},
author = {Ulrich Rührmair and Xiaolin Xu and Jan Sölter and Ahmed Mahmoud and Farinaz Koushanfar and Wayne Burleson},
publisher = {Cryptology ePrint},
title = {Power and Timing Side Channels for PUFs and their Efficient Exploitation},
_pageName = {Farinaz2013Power}
}
@article {Kong2013,
month = {11},
url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6656920},
doi = {10.1109/TETC.2013.2289385},
year = {2013},
volume = {2},
author = {Kong, Joonho and Farinaz Koushanfar},
journal = {IEEE Transactions on Emerging Topics in Computing},
title = {Processor-Based Strong Physical Unclonable Functions with Aging-Based Response Tuning},
pdf = {Kong2013.pdf},
_pageName = {Kong2013}
}
@inproceedings {Munir2013cycar,
booktitle = {Proceedings of the 2013 ACM SIGSAC conference on Computer \& communications security - CCS {\textquoteright}13},
month = {11},
url = {http://dl.acm.org/citation.cfm?doid=2508859.2509030},
pages = {1481 - 1482},
doi = {10.1145/2508859.2509030},
year = {2013},
author = {Arslan Munir and Farinaz Koushanfar and Seudi{\'e}, Herv{\'e} and Ahmad-Reza Sadeghi},
title = {CyCAR{\textquoteright}2013: First international academic workshop on security, privacy and dependability for cybervehicles},
pdf = {Munir2013cycar.pdf},
_pageName = {Munir2013cycar}
}
@conference {Rostami2013hardware,
month = {11},
url = {http://dl.acm.org/citation.cfm?id=2561985},
year = {2013},
author = {Masoud Rostami and Farinaz Koushanfar and Jeyavijayan Rajendran and Ramesh Karri},
journal = {International Conference on Computer-Aided Deisgn},
title = {Hardware Security: Threat Models and Metrics},
pdf = {Rostami2013hardware.pdf},
_pageName = {Rostami2013hardware}
}
@conference {Rostami2013heart,
month = {11},
url = {http://dl.acm.org/citation.cfm?id=2516658},
doi = {10.1145/2508859.2516658},
year = {2013},
author = {Masoud Rostami and Ari Juels and Farinaz Koushanfar},
journal = {ACM Conference on Computer and Communications Security},
title = {Heart-to-Heart (H2H): Authentication for Implanted Medical Devices [updated; see the erratum]},
pdf = {Rostami2013heart.pdf},
_pageName = {Rostami2013heart}
}
@inproceedings {Mirhoseini2013automated,
booktitle = {2013 IEEE International Symposium on Low Power Electronics and Design (ISLPED)International Symposium on Low Power Electronics and Design (ISLPED)},
month = {9},
url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6629262},
pages = {27 - 32},
doi = {10.1109/ISLPED.2013.6629262},
year = {2013},
author = {Azalia Mirhoseini and Songhori, Ebrahim M. and Farinaz Koushanfar},
title = {Automated checkpointing for enabling intensive applications on energy harvesting devices},
pdf = {Mirhoseini2013automated.pdf},
_pageName = {Mirhoseini2013automated}
}
@conference {Rostami2013,
month = {6},
url = {http://dl.acm.org/citation.cfm?id=2488750},
doi = {10.1145/2463209.2488750},
year = {2013},
author = {Masoud Rostami and Wayne Burleson and Ari Juels and Farinaz Koushanfar},
journal = {Design Automation Conference},
title = {Balancing Security and Utility in Medical Devices?},
pdf = {Rostami2013.pdf},
_pageName = {Rostami2013}
}
@article {Munir2013,
month = {4},
url = {http://link.springer.com/article/10.1007\%2Fs11227-013-0916-9},
doi = {10.1007/s11227-013-0916-9},
year = {2013},
volume = {64},
author = {Arslan Munir and Farinaz Koushanfar and Ann Gordon-Ross and Sanjay Ranka},
journal = {The Journal of Supercomputing},
title = {High-Performance Optimizations on Tiled Many-Core Embedded Systems: A Matrix Multiplication Case Study},
pdf = {Munir2013.pdf},
_pageName = {Munir2013}
}
@article {Kiyavash2013,
month = {3},
url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6410028},
pages = {477 - 487},
doi = {10.1109/TIFS.2013.2238930},
year = {2013},
volume = {8},
author = {Kiyavash, Negar and Farinaz Koushanfar and Coleman, Todd P. and Rodrigues, Mavis},
journal = {IEEE Transactions on Information Forensics and Security},
title = {A Timing Channel Spyware for the CSMA/CA Protocol},
pdf = {Kiyavash2013.pdf},
_pageName = {Kiyavash2013}
}
@conference {Mirhoseini2013,
month = {3},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6526735},
doi = {10.1109/PerCom.2013.6526735},
year = {2013},
author = {A. Mirhoseini and E. M. Songhori and F. Koushanfar},
journal = {Pervasive Computing and Communication conference (PerCom)},
title = {Idetic: A High-level Synthesis Approach for Enabling Long Computations on Transiently-powered ASICs},
pdf = {Mirhoseini2013.pdf},
_pageName = {Mirhoseini2013}
}
@inproceedings {Yao2013,
booktitle = {Design, Automation \& Test in Europe (DATE)},
month = {3},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6513541},
doi = {10.7873/DATE.2013.095},
year = {2013},
author = {Yida Yao and Myung-Bo Kim and Jianmin Li and Igor L. Markov and Farinaz Koushanfar},
title = {ClockPUF: Physical Unclonable Functions based on Clock Networks},
pdf = {Yao2013.pdf},
_pageName = {Yao2013}
}
@article {Majzoobi2013,
number = {2},
month = {3},
url = {http://doi.acm.org/10.1145/2442087.2442097},
pages = {26:1{\textendash}26:22},
doi = {10.1145/2442087.2442097},
year = {2013},
volume = {18},
author = {Mehrdad Majzoobi and Kong, Joonho and Farinaz Koushanfar},
journal = {ACM Trans. Des. Autom. Electron. Syst.},
publisher = {ACM},
title = {Low-power Resource Binding by Postsilicon Customization},
address = {New York, NY, USA},
pdf = {Majzoobi2013.pdf},
_pageName = {Majzoobi2013}
}
@article {Majtodaes2011,
number = {in press},
month = {3},
url = {http://dl.acm.org/citation.cfm?id=2442097},
year = {2013},
author = {Mehrdad Majzoobi and Farinaz Koushanfar},
journal = {ACM Transactions on Design Automation of Electronic Systems (TODAES)},
title = {Post-silicon Resource Binding Customization for Low Power},
pdf = {Majtodaes2011.pdf},
_pageName = {Maj todaes 2011}
}
@article {Chen2013,
month = {3},
url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6472113},
pages = {1 - 4},
doi = {10.1109/JETCAS.2013.2244771},
year = {2013},
volume = {3},
author = {Chen, Yen-Kuang and Wu, An-Yeu and Bayoumi, Magdy A. and Farinaz Koushanfar},
journal = {IEEE Journal on Emerging and Selected Topics in Circuits and Systems},
title = {Editorial Low-Power, Intelligent, and Secure Solutions for Realization of Internet of Things},
pdf = {Chen2013.pdf},
_pageName = {Chen2013}
}
@conference {Hu2013,
month = {3},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6513709},
doi = {10.7873/DATE.2013.263},
year = {2013},
author = {Kangqiao Hu and Abdullah Nazma Nowroz and Sherief Reda and Farinaz Koushanfar},
journal = {Design, Automation \& Test in Europe (DATE)},
title = {High-Sensitivity Hardware Trojan Detection Using Multimodal Characterization},
pdf = {Hu2013.pdf},
_pageName = {Hu2013}
}
@article {Mahmoud2013,
url = {http://eprint.iacr.org/2013/632},
year = {2013},
author = {Mahmoud, Ahmed and R{\"u}hrmair,Ulrich and Mehrdad Majzoobi and Farinaz Koushanfar},
journal = {Cryptology ePrint Archive, Report 2013/632},
title = {Combined Modeling and Side Channel Attacks on Strong PUFs},
pdf = {Mahmoud2013.pdf},
_pageName = {Mahmoud2013}
}
@inproceedings {Wei2012provably,
booktitle = {IEEE/ACM International Conference on Computer-Aided Design (ICCAD)},
month = {11},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6386729},
year = {2012},
author = {Sheng Wei and Kai Li and Farinaz Koushanfar and Potkonjak, Miodrag},
title = {Provably Complete Hardware Trojan Detection Using Test Point Insertion},
pdf = {Wei2012provably.pdf},
_pageName = {Wei2012provably}
}
@inproceedings {Koushanfar2012can,
booktitle = {Design Automation Conference (DAC)},
month = {6},
year = {2012},
author = {Farinaz Koushanfar and Saverio Fazzari and Carl McCants and William Bryson and Matthew Sale and Peilin Song and Potkonjak, Miodrag},
publisher = {IEEE},
title = {Can EDA Combat the Rise of Electronic Counterfeiting?},
address = {Can EDA Combat the Rise of Electronic Counterfeiting?},
organization = {IEEE},
pdf = {Koushanfar2012can.pdf},
_pageName = {Koushanfar2012can}
}
@inproceedings {Koushanfar2012eda,
booktitle = {Design Automation Conference (DAC)},
month = {6},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6241514},
year = {2012},
author = {Farinaz Koushanfar and Ahmad-Reza Sadeghi and Herv{\'e} Seudie},
title = {EDA for Secure and Dependable Cybercars: Challenges and Opportunities},
pdf = {Koushanfar2012eda.pdf},
_pageName = {Koushanfar2012eda}
}
@inproceedings {Mirhoseini2012,
booktitle = {Design Automation Conference (DAC)},
month = {6},
url = {dl.acm.org/citation.cfm?id=2228374},
year = {2012},
author = {Azalia Mirhoseini and Potkonjak, Miodrag and Farinaz Koushanfar},
title = {Coding-based Energy Minimization for Phase Change Memory},
pdf = {Mirhoseini2012.pdf},
_pageName = {Mirhoseini2012}
}
@inproceedings {Wei2012hardware,
booktitle = {Design Automation Conference (DAC)},
month = {6},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6241495},
year = {2012},
author = {Sheng Wei and Kai Li and Farinaz Koushanfar and Potkonjak, Miodrag},
title = {Hardware Trojan Horse Benchmark via Optimal Creation and Placement of Malicious Circuitry},
pdf = {Wei2012hardware.pdf},
_pageName = {Wei2012hardware}
}
@inproceedings {Majzoobi2012,
booktitle = {International Workshop on Trustworthy Embedded Devices},
month = {5},
doi = {10.1109/SPW.2012.30},
year = {2012},
author = {Mehrdad Majzoobi and Masoud Rostami and Farinaz Koushanfar and Dan S. Wallach and Srinivas Devadas},
title = {Slender PUF Protocol: A lightweight, robust, and secure authentication by substring matching},
pdf = {Majzoobi2012.pdf},
_pageName = {Majzoobi2012}
}
@article {Wei2012,
month = {4},
issn = {1556-6021},
url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6112216},
pages = {765-773},
doi = {10.1109/TIFS.2011.2181500},
year = {2012},
volume = {7},
author = {Sheng Wei and Nahapetian, Ani and Nelson, Michael and Farinaz Koushanfar and Potkonjak, Miodrag},
journal = {IEEE Transactions on Information Forensics and Security},
title = {Gate Characterization Using Singular Value Decomposition: Foundations and Applications},
pdf = {Wei2012.pdf},
_pageName = {Wei2012}
}
@article {Koushanfar2012,
month = {2},
issn = {1556-6021},
url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5966342},
pages = {51-63},
doi = {10.1109/TIFS.2011.2163307},
year = {2012},
volume = {7},
author = {Farinaz Koushanfar},
journal = {IEEE Transactions on Information Forensics and Security},
title = {Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management},
pdf = {Koushanfar2012.pdf},
_pageName = {Koushanfar2012}
}
@conference {Majzoobi2011fpga,
month = {10},
url = {http://dl.acm.org/citation.cfm?id=2044931},
year = {2011},
author = {Mehrdad Majzoobi and Farinaz Koushanfar and Srini Devadas},
journal = {Workshop on Cryptographic Hardware and Embedded Systems (CHES)},
title = {FPGA-based True Random Number Generation using Circuit Metastability with Adaptive Feedback Control},
pdf = {Majzoobi2011fpga.pdf},
_pageName = {Majzoobi2011fpga}
}
@inproceedings {Wei2011,
isbn = {9781450310055},
booktitle = {Proceedings of the 11th annual ACM workshop on Digital rights management - DRM {\textquoteright}11},
month = {10},
url = {http://dl.acm.org/citation.cfm?doid=2046631.2046635},
pages = {3},
doi = {10.1145/2046631.2046635},
year = {2011},
author = {Sheng Wei and Farinaz Koushanfar and Potkonjak, Miodrag},
title = {Integrated circuit digital rights management techniques using physical level characterization},
pdf = {Wei2011.pdf},
_pageName = {Wei2011}
}
@inproceedings {Mirhoseini2011learning,
booktitle = {International Symposium on Low Power Electronics and Design (ISLPED)},
month = {8},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5993641},
pages = {in press},
year = {2011},
author = {Azalia Mirhoseini and Farinaz Koushanfar},
title = {Learning to Manage Combined Energy Supply Systems},
pdf = {Mirhoseini2011learning.pdf},
_pageName = {Mirhoseini2011learning}
}
@inproceedings {Dyer2011,
booktitle = {Design Automation Conference (DAC)},
month = {6},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5981935},
pages = {in press},
year = {2011},
author = {Eva Dyer and Mehrdad Majzoobi and Farinaz Koushanfar},
title = {Hybrid Spatial Modeling of Non-Stationary Process Variations},
pdf = {Dyer2011.pdf},
_pageName = {Dyer2011}
}
@conference {Koushanfar2011Hybrid,
month = {5},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5938109},
year = {2011},
author = {Farinaz Koushanfar and Azalia Mirhoseini},
journal = {IEEE International Symposium on Circuits and Systems (ISCAS)},
title = {Hybrid Heterogeneous Energy Supply Networks},
pdf = {Koushanfar2011Hybrid.pdf},
_pageName = {Koushanfar2011Hybrid}
}
@conference {Koushanfar2011integrated,
month = {5},
url = {http://dl.acm.org/citation.cfm?id=1973110},
year = {2011},
type = {Invited Paper},
author = {Farinaz Koushanfar},
journal = {GLSVLSI},
title = {Integrated Circuits Metering for Piracy Protection and Digital Rights Management: An Overview},
pdf = {Koushanfar2011integrated.pdf},
_pageName = {Koushanfar2011integrated}
}
@inproceedings {Mehrdad2011,
booktitle = {IEEE International Symposium on Circuits and Systems (ISCAS)},
month = {5},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5938005},
year = {2011},
author = {Mehrdad Majzoobi and Golsa Ghiaasi-Hafezi and Farinaz Koushanfar and Sani Nassif},
title = {Ultra-low Power Current-based PUF},
pdf = {Mehrdad2011.pdf},
_pageName = {Mehrdad2011}
}
@article {Majzoobi2011time,
month = {3},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5737786},
pages = {1123-1135},
year = {2011},
volume = {6},
author = {Mehrdad Majzoobi and Farinaz Koushanfar},
journal = {IEEE Transactions on Information Forensics and Security (TIFS)},
title = {Time-Bounded Authentication of FPGAs},
pdf = {Majzoobi2011time.pdf},
_pageName = {Majzoobi2011time}
}
@article {Koushanfar2011a,
number = {1},
month = {3},
url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true\&arnumber=5657256\&tag=1},
pages = {162 -174},
year = {2011},
volume = {6},
author = {Farinaz Koushanfar and Azalia Mirhoseini},
journal = {IEEE Transactions on Information Forensics and Security},
title = {A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection},
pdf = {Koushanfar2011a.pdf},
_pageName = {Koushanfar2011a}
}
@inproceedings {Mirhoseini2011,
booktitle = {Design, Automation, and Test in Europe conference (DATE)},
month = {3},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5763298},
year = {2011},
author = {Azalia Mirhoseini and Farinaz Koushanfar},
title = {HypoEnergy: Hybrid supercapacitor-battery power-supply optimization for Energy efficiency},
pdf = {Mirhoseini2011.pdf},
_pageName = {Mirhoseini2011}
}
@inbook {Koushanfar2011,
booktitle = {Introduction to Hardware Security and Trust},
year = {2011},
author = {Farinaz Koushanfar},
publisher = {Springer},
editor = {M. Tehranipoor and C. Wang},
title = {Hardware Metering: A Survey.},
organization = {Springer},
pdf = {Koushanfar2011.pdf},
_pageName = {Koushanfar2011}
}
@inbook {Majzoobi2011,
booktitle = {Introduction to Hardware Security and Trust},
year = {2011},
author = {Mehrdad Majzoobi and Farinaz Koushanfar and Potkonjak, Miodrag},
publisher = {Springer},
editor = {M. Tehranipour and M. Wang},
title = {FPGA-oriented Security},
organization = {Springer},
pdf = {Majzoobi2011.pdf},
_pageName = {Majzoobi2011}
}
@inbook {Ruhrmair2011,
booktitle = {Introduction to Hardware Security and Trust},
year = {2011},
author = {Ulrich Ruhrmair and Srinivas Devadas and Farinaz Koushanfar},
publisher = {Springer},
editor = {M. Tehranipoor and C. Wang},
title = {Security based on Physical Unclonability and Disorder},
organization = {Springer},
pdf = {Ruhrmair2011.pdf},
_pageName = {Ruhrmair2011}
}
@conference {Majzoobi2010,
month = {12},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5711471},
year = {2010},
author = {Mehrdad Majzoobi and Farinaz Koushanfar and Srini Devadas},
journal = {IEEE Workshop on Information Forensics and Security},
title = {FPGA PUF using programmable delay lines},
pdf = {Majzoobi2010.pdf},
_pageName = {Majzoobi2010}
}
@inproceedings {Majzoobi2010rapid,
booktitle = {International Test Conference (ITC)},
month = {11},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5699248},
year = {2010},
author = {Mehrdad Majzoobi and Eva Dyer and Ahmed Elnably and Farinaz Koushanfar},
title = {Rapid FPGA Characterization using Clock Synthesis and Signal Sparsity},
pdf = {Majzoobi2010rapid.pdf},
_pageName = {Majzoobi2010rapid}
}
@article {Roy2010,
month = {10},
url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=\&arnumber=5604160},
pages = {30-38},
year = {2010},
volume = {43},
author = {Jarrod A. Roy and Farinaz Koushanfar and Igor L. Markov},
journal = {IEEE Computer},
title = {Ending Piracy of Integrated Circuits},
_pageName = {Roy2010}
}
@inproceedings {Koushanfar2010hierarchical,
booktitle = {Design Automation Conference (DAC)},
month = {6},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5523584},
year = {2010},
author = {F. Koushanfar},
title = {Hierarchical hybrid power supply networks},
pdf = {Koushanfar2010hierarchical.pdf},
_pageName = {Koushanfar2010hierarchical}
}
@inproceedings {Koushanfar2010provably,
booktitle = {International Symposium on Hardware-Oriented Security and Trust (HOST)},
month = {6},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5513115},
year = {2010},
author = {F. Koushanfar and Y. Alkabani},
title = {Provably secure obfuscation of diverse watermarks for sequential circuits},
pdf = {Koushanfar2010provably.pdf},
_pageName = {Koushanfar2010provably}
}
@inproceedings {Mirhoseini2010,
booktitle = {Design Automation Conference (DAC)},
month = {6},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5523560},
year = {2010},
author = {Azalia Mirhoseini and Y. Alkabani and Farinaz Koushanfar},
title = {Real time emulations: foundation and applications},
pdf = {Mirhoseini2010.pdf},
_pageName = {Mirhoseini2010}
}
@inproceedings {Koushanfar2010a,
booktitle = {Information Hiding Conference},
month = {5},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5657256},
year = {2010},
author = {Farinaz Koushanfar and Azalia Mirhoseini and Y. Alkabani},
title = {A unified framework for multimodal submodular IC trojan detection},
_pageName = {Koushanfar2010a}
}
@inproceedings {Majzoobi2010fpga,
booktitle = {Information Hiding},
month = {5},
url = {http://dl.acm.org/citation.cfm?id=1929305},
year = {2010},
author = {Mehrdad Majzoobi and Ahmed Elnably and Farinaz Koushanfar},
editor = {Rainer B{\"o}hme and Philip Fong and Reihaneh {Safavi-Naini}},
title = {FPGA Time-Bounded Unclonable Authentication},
series = {Lecture Notes in Computer Science},
pdf = {Majzoobi2010fpga.pdf},
_pageName = {Majzoobi2010fpga}
}
@inproceedings {Tehranipoor2010a,
booktitle = {IEEE Design \& Test of Computers},
month = {2},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5406669\&tag=1},
year = {2010},
author = {M. Tehranipoor and F. Koushanfar},
title = {A Survey of Hardware Trojan Taxonomy and Detection},
pdf = {Tehranipoor2010a.pdf},
_pageName = {Tehranipoor2010a}
}
@article {Koushanfar2010,
month = {2},
url = {http://dl.acm.org/citation.cfm?id=1737518},
pages = {626 - 637},
year = {2010},
volume = {58},
author = {Farinaz Koushanfar and Mehrdad Majzoobi and Potkonjak, Miodrag},
journal = {IEEE Trans. On Signal Processing},
title = {Nonparametric Combinatorial Regression for Shape Constrained Modeling},
pdf = {Nonparametric Combinatorial Regression for Shape Constrained Modeling.pdf},
_pageName = {Koushanfar2010}
}
@article {Tehranipoor2010,
month = {1},
issn = {0740-7475},
url = {http://www.computer.org/csdl/mags/dt/2010/01/mdt2010010008-abs.html},
pages = {8 - 9},
year = {2010},
volume = {27},
author = {Tehranipoor, Mohammad and Farinaz Koushanfar},
journal = {IEEE Design \& Test of Computers},
title = {Guest Editors{\textquoteright} Introduction: Confronting the Hardware Trustworthiness Problem},
pdf = {Tehranipoor2010.pdf},
_pageName = {Tehranipoor2010}
}
@article {Potkonjak2009,
month = {5},
year = {2009},
author = {M. Potkonjak and F. Koushanfar},
title = {Identification Of Integrated Circuits},
pdf = {Potkonjak2009.pdf},
_pageName = {Potkonjak2009}
}
@article {Majzoobi2009,
month = {3},
pages = {5:1{\textendash}5:33},
year = {2009},
volume = {2},
author = {Mehrdad Majzoobi and Farinaz Koushanfar and Potkonjak, Miodrag},
journal = {ACM Transactions on Reconfigurable Technology and Systems (TRETS)},
title = {Techniques for Design and Implementation of Secure Reconfigurable PUFs},
pdf = {Majzoobi2009.pdf},
_pageName = {Majzoobi2009}
}
@article {Koushanfar2009,
pages = {332 - 345},
year = {2009},
volume = {57},
author = {F. Koushanfar and D. Shamsi},
journal = {Institute of Mathematical Statistics (IMS) Lecture Notes-Monograph Series (LNMS)},
title = {The challenges of model objective selection and estimation for ad-hoc network data sets},
pdf = {Koushanfar2009.pdf},
_pageName = {Koushanfar2009}
}
@inproceedings {Nelson2009,
booktitle = {Information Hiding (IH)},
pages = {221 - 234},
year = {2009},
author = {M. Nelson and A. Nahapetian and F. Koushanfar and M. Potkonjak},
title = {SVD-Based Ghost Circuitry Detection},
pdf = {Nelson2009.pdf},
_pageName = {Nelson2009}
}
@inproceedings {Alkabani2009,
booktitle = {International Symposium on Low Power Electronics and Designs (ISLPED)},
pages = {331 - 334},
year = {2009},
author = {Y. Alkabani and F. Koushanfar and M. Potkonjak},
title = {N-version temperature-aware scheduling and binding},
pdf = {Alkabani2009.pdf},
_pageName = {Alkabani2009}
}
@inproceedings {Alkabani2009consistency,
booktitle = {IEEE/ACM International Conference on Computer Aided Design (ICCAD)},
url = {http://doi.acm.org/10.1145/1687399.1687426},
pages = {123-127},
year = {2009},
author = {Y. Alkabani and Farinaz Koushanfar},
title = {Consistency-based characterization for IC Trojan detection},
pdf = {Alkabani2009consistency.pdf},
_pageName = {Alkabani2009consistency}
}
@inproceedings {C2009,
isbn = {978-1-4244-4805-0},
booktitle = {2009 IEEE International Workshop on Hardware-Oriented Security and Trust2009 IEEE International Workshop on Hardware-Oriented Security and Trust},
url = {http://www.computer.org/csdl/proceedings/hst/2009/4805/00/05224969-abs.html},
pages = {43 - 49},
doi = {10.1109/HST.2009.5224969},
year = {2009},
author = {Candore, Andrea and Kocabas, Ovunc and Farinaz Koushanfar},
publisher = {IEEE},
title = {Robust stable radiometric fingerprinting for wireless devices},
address = {San Francisco, CA, USA},
organization = {IEEE},
pdf = {C2009.pdf},
_pageName = {C2009}
}
@inproceedings {Koushanfar2008,
booktitle = {International Conference on Computer Aided Design (ICCAD)},
pages = {185 - 189},
year = {2008},
author = {F. Koushanfar and P. Boufounos and D. Shamsi},
title = {Post-silicon timing characterization by compressed sensing},
pdf = {Koushanfar2008.pdf},
_pageName = {Koushanfar2008}
}
@inproceedings {Majzoobi2008,
booktitle = {International Test Conference (ITC)},
pages = {1 - 10},
year = {2008},
author = {Mehrdad Majzoobi and Farinaz Koushanfar and Potkonjak, Miodrag},
title = {Testing Techniques for Hardware Security},
pdf = {Majzoobi2008.pdf},
_pageName = {Majzoobi2008}
}
@inproceedings {Majzoobi2008lightweight,
booktitle = {International Conference on Computer-Aided Design (ICCAD)},
pages = {670 - 673},
year = {2008},
author = {Mehrdad Majzoobi and Farinaz Koushanfar and Potkonjak, Miodrag},
title = {Lightweight Secure PUFs},
pdf = {Majzoobi2008lightweight.pdf},
_pageName = {Majzoobi2008lightweight}
}
@inproceedings {Roy2008,
isbn = {978-1-4244-2401-6},
booktitle = {2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)2008 IEEE International Workshop on Hardware-Oriented Security and Trust},
url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4559052},
pages = {65 - 66},
doi = {10.1109/HST.2008.4559052},
year = {2008},
author = {Jarrod A. Roy and Farinaz Koushanfar and Igor L. Markov},
publisher = {IEEE},
title = {Extended abstract: Circuit CAD tools as a security threat},
address = {Anaheim, CA, USA},
organization = {IEEE},
_pageName = {Roy2008}
}
@inproceedings {Roy2008epic,
booktitle = {Design Automation and Test in Europe (DATE)},
year = {2008},
author = {J. Roy and F. Koushanfar and I. Markov},
title = {EPIC: Ending Piracy of Integrated Circuits},
pdf = {Roy2008epic.pdf},
_pageName = {Roy2008epic}
}
@inproceedings {Roy2008protecting,
booktitle = {Design Automation Conference (DAC)},
pages = {846 - 851},
year = {2008},
author = {J. Roy and F. Koushanfar and I. Markov},
title = {Protecting bus-based hardware IP by secret sharing},
pdf = {Roy2008protecting.pdf},
_pageName = {Roy2008protecting}
}
@inproceedings {Shamsi2008,
isbn = {9781605580739},
booktitle = {the 9th ACM international symposiumProceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing - MobiHoc {\textquoteright}08},
url = {http://dl.acm.org/citation.cfm?doid=1374618.1374667},
pages = {361},
doi = {10.1145/1374618.1374667},
year = {2008},
author = {Shamsi, Davood and Farinaz Koushanfar and Potkonjak, Miodrag},
publisher = {ACM Press},
title = {Challenging benchmark for location discovery in ad hoc networks},
address = {Hong Kong, Hong Kong, ChinaNew York, New York, USA},
organization = {ACM Press},
_pageName = {Shamsi2008}
}
@article {Shamsi2008how,
url = {http://www.ruf.rice.edu/~ds2/main-LehmannFK.pdf},
year = {2008},
author = {D. Shamsi and F. Koushanfar},
title = {How challenging is modeling of a data set?},
pdf = {Shamsi2008how.pdf},
_pageName = {Shamsi2008how}
}
@inproceedings {Shamsi2008noninvasive,
booktitle = {ISLPED: Proceeding of international symposium on Low power electronics and design},
pages = {341 - 346},
year = {2008},
author = {D. Shamsi and P. Boufounos and F. Koushanfar},
title = {Noninvasive leakage power tomography of integrated circuits by compressive sensing},
pdf = {Shamsi2008noninvasive.pdf},
_pageName = {Shamsi2008noninvasive}
}
@inproceedings {Potkonjak2008,
booktitle = {Design Automation Conference (DAC)},
pages = {351 - 352},
year = {2008},
author = {Potkonjak, Miodrag and Farinaz Koushanfar},
title = {(Bio)-behavioral CAD},
pdf = {(Bio)-behavioral CAD.pdf},
_pageName = {Potkonjak2008}
}
@inproceedings {Alkabani2008,
isbn = {978-1-4244-2401-6},
booktitle = {2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)2008 IEEE International Workshop on Hardware-Oriented Security and Trust},
url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4559059},
pages = {82 - 83},
doi = {10.1109/HST.2008.4559059},
year = {2008},
author = {Yousra Alkabani and Farinaz Koushanfar},
publisher = {IEEE},
title = {Extended abstract: Designer{\textquoteright}s hardware Trojan horse},
address = {Anaheim, CA, USA},
organization = {IEEE},
_pageName = {Alkabani2008}
}
@inproceedings {Alkabani2008active,
booktitle = {Compilers, Architectures, and Synthesis for Embedded Systems (CASES)},
year = {2008},
author = {Y. Alkabani and F. Koushanfar},
title = {Active Control and Digital Rights Management of Integrated Circuit IP Cores},
pdf = {Alkabani2008active.pdf},
_pageName = {Alkabani2008active}
}
@article {Alkabani2008input,
year = {2008},
author = {Y. Alkabani and T. Massey and F. Koushanfar and M. Potkonjak},
institution = {Rice University, Electrical and Computer Engineering Department},
title = {Input Vector Control for Post-Silicon Leakage Current Minimization under Manufacturing Variations},
pdf = {Alkabani2008input.pdf},
_pageName = {Alkabani2008input}
}
@inproceedings {Alkabani2008n,
booktitle = {Design Automation Conference (DAC)},
pages = {546 - 551},
year = {2008},
author = {Y. Alkabani and F. Koushanfar},
title = {N-variant IC design: methodology and applications},
pdf = {Alkabani2008n.pdf},
_pageName = {Alkabani2008n}
}
@inproceedings {Alkabani2008trusted,
booktitle = {Information Hiding (IH)},
pages = {102 - 117},
year = {2008},
author = {Y. Alkabani and F. Koushanfar and N. Kiyavash and M. Potkonjak},
title = {Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach},
_pageName = {Alkabani2008trusted}
}
@inproceedings {Kiyavash2007,
booktitle = {IEEE Mobile Ad-hoc and Sensor Systems (MASS)},
year = {2007},
author = {N. Kiyavash and F. Koushanfar},
title = {Anti-Collusion Position Estimation in Wireless Sensor Networks},
pdf = {Kiyavash2007.pdf},
_pageName = {Kiyavash2007}
}
@article {Koushanfar2007,
pages = {16 - 16},
year = {2007},
volume = {6},
author = {F. Koushanfar and A. Daware and D. Nguyen and M. Potkonjak and A. Sangiovanni-Vincentelli},
journal = {ACM Transaction on Embedded Computing Systems},
title = {Techniques for Maintaining Connectivity Ad-hoc Networks Under Energy Constraints},
pdf = {Koushanfar2007.pdf},
_pageName = {Koushanfar2007}
}
@inproceedings {Koushanfar2007a,
booktitle = {Design Automation Conference (DAC)},
pages = {268 - 269},
year = {2007},
author = {F. Koushanfar and M. Potkonjak},
title = {A general framework for spatial correlation modeling in VLSI design},
_pageName = {Koushanfar2007a}
}
@inproceedings {Koushanfar2007cad,
booktitle = {Design Automation Conference (DAC)},
year = {2007},
author = {F. Koushanfar and M. Potkonjak},
title = {CAD-based Security, Cryptography, and Digital Rights Management},
pdf = {Koushanfar2007cad.pdf},
_pageName = {Koushanfar2007cad}
}
@inproceedings {Koushanfar2007hardware,
booktitle = {IEEE International Conference on Microelectronic Systems Education},
year = {2007},
author = {F. Koushanfar and M. Potkonjak},
title = {Hardware Security: Preparing Students for the Next Design Frontiers},
pdf = {Koushanfar2007hardware.pdf},
_pageName = {Koushanfar2007hardware}
}
@inproceedings {So2007,
booktitle = {Information Processing in Sensor Networks (IPSN)},
pages = {226 - 235},
year = {2007},
author = {S. So and F. Koushanfar and A. Kosterev and F. Tittel},
title = {LaserSPECks: Laser SPECtroscopic trace-gas sensor networks - sensor integration and applications},
pdf = {So2007.pdf},
_pageName = {So2007}
}
@inproceedings {Alkabani2007,
booktitle = {International Conference on Computer Aided Design (ICCAD)},
pages = {674 - 677},
year = {2007},
author = {Y. Alkabani and Farinaz Koushanfar and Potkonjak, Miodrag},
title = {Remote activation of ICs for piracy prevention and digital right management},
pdf = {Alkabani2007.pdf},
_pageName = {Alkabani2007}
}
@inproceedings {Conf:alk07,
booktitle = {USENIX Security Symposium},
pages = {291-306},
year = {2007},
author = {Y. Alkabani and Farinaz Koushanfar},
title = {Active Hardware Metering for Intellectual Property Protection and Security},
_pageName = {Conf:alk07}
}
@inproceedings {Koushanfar2006,
booktitle = {Proceedings of IEEE Sensors},
pages = {888 - 891},
year = {2006},
author = {F. Koushanfar and N. Kiyavash and M. Potkonjak},
title = {Interacting Particle-based Model for Missing Data in Sensor Networks: Foundations and Applications},
pdf = {Koushanfar2006.pdf},
_pageName = {Koushanfar2006}
}
@inbook {Koushanfar2006watermarking,
booktitle = {Security in Sensor Networks},
year = {2006},
author = {F. Koushanfar and M. Potkonjak},
publisher = {CRC Press},
editor = {Y. Xiao},
title = {Watermarking Technique for Sensor Networks: Foundations and Applications},
organization = {CRC Press},
_pageName = {Koushanfar2006watermarking}
}
@inproceedings {Sleeping,
booktitle = {IEEE International Conference on Computer Communications (INFOCOM)},
pages = {1 -13},
year = {2006},
author = {F. Koushanfar and N. Taft and M. Potkonjak},
title = {Sleeping Coordination for Comprehensive Sensing Using Isotonic Regression and Domatic Partitions},
pdf = {Sleeping.pdf},
_pageName = {Sleeping}
}
@article {Koushanfar2005,
pages = {523 - 545},
year = {2005},
volume = {10},
author = {Farinaz Koushanfar and Inki Hong and Potkonjak, Miodrag},
journal = {ACM Trans. Design Automation of Electronic Sys.},
title = {Behavioral synthesis techniques for intellectual property protection},
pdf = {Koushanfar2005.pdf},
_pageName = {Koushanfar2005}
}
@mastersthesis {Koushanfar2005ensuring,
year = {2005},
author = {F. Koushanfar},
title = {Ensuring Data Integrity in Sensor-Based Networked Systems},
school = {Dept. of Electrical Engineering and Computer Science, UC Berkeley},
_pageName = {Koushanfar2005ensuring}
}
@inproceedings {Koushanfar2005markov,
booktitle = {IEEE Sensors},
pages = {1430 - 1434},
year = {2005},
author = {F. Koushanfar and M. Potkonjak},
title = {Markov chain-based models for missing and faulty data in MICA2 sensor motes},
pdf = {Koushanfar2005markov.pdf},
_pageName = {Koushanfar2005markov}
}
@inbook {Koushanfar2005sensor,
booktitle = {Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems},
year = {2005},
author = {F. Koushanfar and M. Potkonjak and J. Feng,},
publisher = {CRC Press},
title = {Sensor Network Architecture},
organization = {CRC Press},
pdf = {Koushanfar2005sensor.pdf},
_pageName = {Koushanfar2005sensor}
}
@mastersthesis {Koushanfar2005statistical,
year = {2005},
author = {F. Koushanfar},
title = {Statistical modeling and recovery of intermittent sensor data streams},
school = {Dept. of Statistics, UC Berkeley},
_pageName = {Koushanfar2005statistical}
}
@article {Megerian2005,
pages = {84 - 92},
year = {2005},
volume = {4},
author = {S. Megerian and F. Koushanfar and M. Potkonjak and M. Srivastava},
journal = {IEEE Transactions on Mobile Computing},
title = {Worst- and Best-Case Coverage in Sensor Networks},
pdf = {Megerian2005.pdf},
_pageName = {Megerian2005}
}
@inproceedings {Wong2005,
booktitle = {ACM/IEEE-CAS/EDAC Design Automation Conference (DAC)},
pages = {909 - 914},
year = {2005},
author = {J. Wong and F. Koushanfar and M. Potkonjak},
title = {Flexible ASICs: Shared Masking for Multiple Media Processors},
pdf = {Wong2005.pdf},
_pageName = {Wong2005}
}
@inproceedings {Koushanfar2004,
booktitle = {IEEE Sensors},
pages = {1472 - 1475},
year = {2004},
volume = {2},
author = {F. Koushanfar and M. Potkonjak and A. Sangiovanni-Vincentelli},
title = {Error models for light sensors by statistical analysis of raw sensor measurements},
pdf = {Koushanfar2004.pdf},
_pageName = {Koushanfar2004}
}
@article {Wong2004,
pages = {859 - 868},
year = {2004},
volume = {23},
author = {J. Wong and F. Koushanfar and S. Megerian and M. Potkonjak},
journal = {IEEE Transactions of Computer Aided Designs (CAD)},
title = {Probabilistic Constructive Optimization Techniques},
pdf = {Wong2004.pdf},
_pageName = {Wong2004}
}
@inproceedings {Koushanfar2003,
booktitle = {ACM International Symposium on Low Power Electronics and Design (ISLPED)},
pages = {475 - 480},
year = {2003},
author = {F. Koushanfar and A. Davare and D. Nguyen and M. Potkonjak and A. Sangiovanni-Vincentelli},
title = {Sleeping Coordination for Comprehensive Sensing Using Isotonic Regression and Domatic Partitions},
pdf = {Koushanfar2003.pdf},
_pageName = {Koushanfar2003}
}
@inbook {Koushanfar2003location,
booktitle = {Ad Hoc Wireless Networking},
year = {2003},
author = {F. Koushanfar and S. Slijepcevic and M. Potkonjak and A. Sangiovanni-Vincentelli},
publisher = {Kluwer},
editor = {X. Cheng and X. Huang and Du,D.Z.},
title = {Location Discovery in Ad-hoc Wireless Sensor Networks},
organization = {Kluwer},
_pageName = {Koushanfar2003location}
}
@inproceedings {Koushanfar2003low,
booktitle = {ACM International Symposium on Low Power Electronics and Design (ISLPED)},
pages = {475 - 480},
year = {2003},
author = {F. Koushanfar and A. Davare and D. Nguyen and M. Potkonjak and A. Sangiovanni-Vincentelli},
title = {Low Power Coordination in Wireless Ad-hoc Networks},
pdf = {Koushanfar2003low.pdf},
_pageName = {Koushanfar2003low}
}
@inproceedings {Koushanfar2003on,
booktitle = {IEEE Sensors},
pages = {974 - 979},
year = {2003},
volume = {2},
author = {F. Koushanfar and M. Potkonjak and A. Sangiovanni-Vincentelli},
title = {On-line fault detection of sensor measurements},
pdf = {Koushanfar2003on.pdf},
_pageName = {Koushanfar2003on}
}
@inproceedings {Koushanfar2002,
isbn = {0-7803-7402-9},
booktitle = {Proceedings of ICASSP {\textquoteright}02IEEE International Conference on Acoustics Speech and Signal Processing},
url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5745660},
pages = {IV-4186 - IV-4186},
doi = {10.1109/ICASSP.2002.5745660},
year = {2002},
author = {Farinaz Koushanfar and Slijepcevic, Sascha and Wong, Jennifer and M. Potkonjak},
publisher = {IEEE},
title = {Global error-tolerant algorithms for location discovery in ad-hoc wireless Netoworks},
address = {Orlando, FL, USA},
organization = {IEEE},
_pageName = {Koushanfar2002}
}
@inproceedings {Koushanfar2002error,
booktitle = {IEEE CAS Workshop on Wireless Communications and Networking},
year = {2002},
author = {F. Koushanfar and S. Slijepcevic and M. Potkonjak and A. Sangiovanni-Vincentelli},
title = {Error-Tolerant Multi-Modal Sensor Fusion},
pdf = {Koushanfar2002error.pdf},
_pageName = {Koushanfar2002error}
}
@inproceedings {Koushanfar2002fault,
booktitle = {IEEE Sensors},
pages = {1491 - 1496},
year = {2002},
volume = {2},
author = {F. Koushanfar and M. Potkonjak and A. Sangiovanni-Vincentelli},
title = {Fault tolerance techniques for wireless ad hoc sensor networks},
pdf = {Koushanfar2002fault.pdf},
_pageName = {Koushanfar2002fault}
}
@inproceedings {Koushanfar2002ilp,
booktitle = {ACM/IEEE-CAS/EDAC Design Automation Conference (DAC)},
pages = {910 - 915},
year = {2002},
author = {F. Koushanfar and J. Wong and J. Feng and M. Potkonjak},
title = {ILP-based Engineering Change},
pdf = {Koushanfar2002ilp.pdf},
_pageName = {Koushanfar2002ilp}
}
@article {Megerian2002,
pages = {443 - 454},
year = {2002},
volume = {8},
author = {S. Megerian and F. Koushanfar and G. Qu and G. Veltri and M. Potkonjak},
journal = {ACM Journal of Wireless Networks},
title = {Exposure In Wireless Sensor Networks: Theory And Practical Solutions},
pdf = {Megerian2002.pdf},
_pageName = {Megerian2002}
}
@inproceedings {Feng2002,
booktitle = {International Conference of Computer Design},
pages = {226 - 231},
year = {2002},
author = {J. Feng and F. Koushanfar and M. Potkonjak},
title = {System-Architectures for Sensor Networks Issues, Alternatives, and Directions},
pdf = {Feng2002.pdf},
_pageName = {Feng2002}
}
@article {Koushanfar2001,
pages = {392 - 401},
year = {2001},
volume = {20},
author = {F. Koushanfar and D. Kirovski and I. Hong and M. Potkonjak and M.C. Papaefthymiou},
journal = {IEEE Transactions on Computer-Aided Design (DAC)},
title = {Symbolic debugging of embedded hardware and software},
pdf = {Koushanfar2001.pdf},
_pageName = {Koushanfar2001}
}
@inproceedings {Koushanfar2001hardware,
booktitle = {Design Automation Conference (DAC)},
pages = {490 - 493},
year = {2001},
author = {F. Koushanfar and G. Qu},
title = {Hardware Metering},
pdf = {Koushanfar2001hardware.pdf},
_pageName = {Koushanfar2001hardware}
}
@inproceedings {Koushanfar2001intellectual,
booktitle = {Information Hiding Workshop (IHW)},
pages = {81 - 95},
year = {2001},
author = {F. Koushanfar and G. Qu and M. Potkonjak},
title = {Intellectual Property Metering},
pdf = {Koushanfar2001intellectual.pdf},
_pageName = {Koushanfar2001intellectual}
}
@mastersthesis {Koushanfar2001iterative,
year = {2001},
author = {F. Koushanfar},
title = {Iterative error-tolerant location discovery in ad-hoc wireless sensor networks},
school = {Dept. of Electrical Engineering, University of California, Los Angeles},
_pageName = {Koushanfar2001iterative}
}
@inproceedings {Meguerdichian2001,
isbn = {1581132972},
booktitle = {the 38th conferenceProceedings of the 38th conference on Design automation - DAC {\textquoteright}01},
url = {http://dl.acm.org/citation.cfm?doid=378239.379028},
pages = {585 - 590},
doi = {10.1145/378239.379028},
year = {2001},
author = {Seapahn Meguerdichian and Farinaz Koushanfar and Morge, Advait and Petranovic, Dusan and Potkonjak, Miodrag},
publisher = {ACM Press},
title = {MetaCores: Design and Optimization Techniques},
address = {Las Vegas, Nevada, United StatesNew York, New York, USA},
organization = {ACM Press},
_pageName = {Meguerdichian2001}
}
@inproceedings {Meguerdichian2001coverage,
booktitle = {Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM)},
pages = {1380 - 1387},
year = {2001},
volume = {3},
author = {S. Meguerdichian and F. Koushanfar and M. Potkonjak and M. Srivastava},
title = {Coverage Problems in Wireless Ad-Hoc Sensor Networks},
pdf = {Meguerdichian2001coverage.pdf},
_pageName = {Meguerdichian2001coverage}
}
@inproceedings {Meguerdichian2001exposure,
booktitle = {International conference on Mobile computing and networking (MobiCom)},
pages = {139 - 150},
year = {2001},
author = {S. Meguerdichian and F. Koushanfar and G. Qu and M. Potkonjak},
title = {Exposure in wireless Ad-Hoc sensor networks},
pdf = {Meguerdichian2001exposure.pdf},
_pageName = {Meguerdichian2001exposure}
}
@inproceedings {Wong2001,
booktitle = {IEEE/ACM International Conference on Computer Aided Design (ICCAD)},
pages = {453 - 456},
year = {2001},
author = {J. Wong and F. Koushanfar and S. Meguerdichian and M. Potkonjak},
title = {A Probabilistic Constructive Approach to Optimization Problems},
pdf = {Wong2001.pdf},
_pageName = {Wong2001}
}
@inproceedings {Koushanfar2000,
booktitle = {IEEE/ACM International Conference on Computer Aided Design (ICCAD)},
pages = {40 - 43},
year = {2000},
author = {F. Koushanfar and D. Kirovski and M. Potkonjak},
title = {Symbolic Debugging Scheme for Optimized Hardware and Software},
pdf = {Koushanfar2000.pdf},
_pageName = {Koushanfar2000}
}
@inproceedings {Koushanfar2000processors,
booktitle = {International Conference on Computer Designs (ICCD)},
pages = {603 - 608},
year = {2000},
author = {F. Koushanfar and V. Prabhu and M. Potkonjak and J.M. Rabaey},
title = {Processors for Mobile Applications},
pdf = {Koushanfar2000processors.pdf},
_pageName = {Koushanfar2000processors}
}
@inproceedings {Rabaey2000,
booktitle = {IEEE/ACM International Conference on Computer Aided Design (ICCAD)},
pages = {76 - 82},
year = {2000},
author = {J.M. Rabaey and M. Potkonjak and F. Koushanfar and S. Li and T. Tuan},
title = {Challenges and Opportunities in Broadband and Wireless Communication Designs},
pdf = {Rabaey2000.pdf},
_pageName = {Rabaey2000}
}
@inproceedings {Caldwell2000,
isbn = {1581131879},
booktitle = {the 37th conferenceProceedings of the 37th conference on Design automation - DAC {\textquoteright}00},
url = {http://dl.acm.org/citation.cfm?doid=337292.337617},
pages = {693 - 698},
doi = {10.1145/337292.337617},
year = {2000},
author = {Caldwell, Andrew E. and Yu Cao and Kahng, Andrew B. and Farinaz Koushanfar and Lu, Hua and Igor L. Markov and Oliver, Michael and Stroobandt, Dirk and Sylvester, Dennis},
publisher = {ACM Press},
title = {GTX: The MARCO GSRC Technology Extrapolation System},
address = {Los Angeles, California, United StatesNew York, New York, USA},
organization = {ACM Press},
_pageName = {Caldwell2000}
}
Retrieved from "https://aceslab.org/mw/index.php?title=Publications&oldid=1056"