Special

View table: publication

< Cargo tables

Table structure:

  • entry - String
  • address - String
  • annote - String
  • author - List of String
  • booktitle - String
  • chapter - String
  • edition - String
  • editor - List of String
  • howpublished - String
  • institution - String
  • journal - String
  • month - Integer
  • note - String
  • number - String
  • organization - String
  • pages - String
  • publisher - String
  • school - String
  • series - String
  • title - String
  • type - String
  • volume - String
  • year - Integer
  • doi - String
  • issn - String
  • isbn - String
  • url - String
  • pdf - File

This table has 216 rows altogether.

Page entry address annote author booktitle chapter edition editor howpublished institution journal month note number organization pages publisher school series title type volume year doi issn isbn url pdf
Abera2016 inproceedings Tigist Abera N. Asokan Lucas Davi Farinaz Koushanfar Andrew Paverd Ahmad-Reza Sadeghi Gene Tsudik Design Automation Conference (DAC) 6 Things, Trouble, Trust: On Building Trust in IoT Systems 2,016
Abera2016.pdf
Adans2020 article Mojan Javaheripi Mohammad Samragh Tara Javidi Farinaz Koushanfar 5 IEEE Journal of Selected Topics in Signal Processing (JSTSP) AdaNS: Adaptive Non-Uniform Sampling for Automated Design of Compact DNNs 2,020 https://ieeexplore.ieee.org/abstract/document/9086078
AdaNS 2020.pdf
Alkabani2007 inproceedings Y. Alkabani Farinaz Koushanfar Potkonjak, Miodrag International Conference on Computer Aided Design (ICCAD) 0 674 - 677 Remote activation of ICs for piracy prevention and digital right management 2,007
Alkabani2007.pdf
Alkabani2008 inproceedings Anaheim, CA, USA Yousra Alkabani Farinaz Koushanfar 2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)2008 IEEE International Workshop on Hardware-Oriented Security and Trust 0 IEEE 82 - 83 IEEE Extended abstract: Designer{\textquoteright}s hardware Trojan horse 2,008 10.1109/HST.2008.4559059 978-1-4244-2401-6 http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4559059 Alkabani2008.pdf
Alkabani2008active inproceedings Y. Alkabani F. Koushanfar Compilers, Architectures, and Synthesis for Embedded Systems (CASES) 0 Active Control and Digital Rights Management of Integrated Circuit IP Cores 2,008
Alkabani2008active.pdf
Alkabani2008input article Y. Alkabani T. Massey F. Koushanfar M. Potkonjak Rice University, Electrical and Computer Engineering Department 0 Input Vector Control for Post-Silicon Leakage Current Minimization under Manufacturing Variations 2,008
Alkabani2008input.pdf
Alkabani2008n inproceedings Y. Alkabani F. Koushanfar Design Automation Conference (DAC) 0 546 - 551 N-variant IC design: methodology and applications 2,008
Alkabani2008n.pdf
Alkabani2008trusted inproceedings Y. Alkabani F. Koushanfar N. Kiyavash M. Potkonjak Information Hiding (IH) 0 102 - 117 Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach 2,008 Alkabani2008trusted.pdf
Alkabani2009 inproceedings Y. Alkabani F. Koushanfar M. Potkonjak International Symposium on Low Power Electronics and Designs (ISLPED) 0 331 - 334 N-version temperature-aware scheduling and binding 2,009
Alkabani2009.pdf
Alkabani2009consistency inproceedings Y. Alkabani Farinaz Koushanfar IEEE/ACM International Conference on Computer Aided Design (ICCAD) 0 123-127 Consistency-based characterization for IC Trojan detection 2,009 http://doi.acm.org/10.1145/1687399.1687426
Alkabani2009consistency.pdf
Autorank2021 article Mojan Javaheripi Mohammad Samragh Farinaz Koushanfar 12 IEEE Journal on Emerging and Selected Topics in Circuits and Systems AutoRank: Automated Rank Selection for Effective Neural Network Customization 2,021 https://ieeexplore.ieee.org/abstract/document/9611209
AutoRank 2021.pdf
C2009 inproceedings San Francisco, CA, USA C ore, Andrea Kocabas, Ovunc Farinaz Koushanfar 2009 IEEE International Workshop on Hardware-Oriented Security and Trust2009 IEEE International Workshop on Hardware-Oriented Security and Trust 0 IEEE 43 - 49 IEEE Robust stable radiometric fingerprinting for wireless devices 2,009 10.1109/HST.2009.5224969 978-1-4244-4805-0 http://www.computer.org/csdl/proceedings/hst/2009/4805/00/05224969-abs.html
C2009.pdf
Caldwell2000 inproceedings Los Angeles, California, United StatesNew York, New York, USA Caldwell, Andrew E. Yu Cao Kahng, Andrew B. Farinaz Koushanfar Lu, Hua Igor L. Markov Oliver, Michael Stroob t, Dirk Sylvester, Dennis the 37th conferenceProceedings of the 37th conference on Design automation - DAC {\textquoteright}00 0 ACM Press 693 - 698 ACM Press GTX: The MARCO GSRC Technology Extrapolation System 2,000 10.1145/337292.337617 1581131879 http://dl.acm.org/citation.cfm?doid=337292.337617 Caldwell2000.pdf
Chatterjee2019 inproceedings Rahul Chatterjee M. Sadegh Riazi Tanmoy Chowdhury Emanuela Marasco Farinaz Koushanfar Ari Juels ACM CCS 11 ACM ACM Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms 2,019
Chatterjee2019.pdf
Chen2013 article Chen, Yen-Kuang Wu, An-Yeu Bayoumi, Magdy A. Farinaz Koushanfar IEEE Journal on Emerging and Selected Topics in Circuits and Systems 3 1 - 4 Editorial Low-Power, Intelligent, and Secure Solutions for Realization of Internet of Things 3 2,013 10.1109/JETCAS.2013.2244771 http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6472113
Chen2013.pdf
Chen2017 inproceedings Boston, MA, USA Huili Chen Seetal Potluri Farinaz Koushanfar IEEE International Conference on Computer Design (ICCD) 11 IEEE IEEE BioChipWork: Reverse Engineering of Microfluidic Biochips 2,017 10.1109/ICCD.2017.11 978-1-5386-2255-1 978-1-5386-2254-4 https://ieeexplore.ieee.org/abstract/document/8119184/
Chen2017.pdf
Chen2018 inproceedings Huili Chen Bita Darvish Rouhani Farinaz Koushanfar 0 DeepMarks: A Digital Fingerprinting Framework for Deep Neural Networks 2,018 https://arxiv.org/abs/1804.03648
Chen2018.pdf
Chen2019 conference Huili Chen Bita Darvish Rouhani Cheng Fu Jishen Zhao Farinaz Koushanfar ACM International Conference on Multimedia Retrieval (ICMR) 0 ACM DeepMarks: A Secure Fingerprinting Framework for Digital Rights Management of Deep Learning Models 2,019
Chen2019.pdf
Chen2019deepattest inproceedings Huili Chen Cheng Fu Bita Darvish Rouhani Jishen Zhao Farinaz Koushanfar International Symposium on Computer Architecture (ISCA) 6 DeepAttest: An End-to-End Attestation Framework for Deep Neural Networks 2,019
Chen2019deepattest.pdf
Chen2019deepinspect inproceedings Macao, China Huili Chen Cheng Fu Jishen Zhao Farinaz Koushanfar International Joint Conference on Artificial Intelligence (IJCAI) 8 DeepInspect: A Black-box Trojan Detection and Mitigation Framework for Deep Neural Networks 2,019
Chen2019deepinspect.pdf
Chen2019genunlock conference Westminster, CO Huili Chen Cheng Fu Jishen Zhao Farinaz Koushanfar International Conference On Computer Aided Design (ICCAD) 11 GenUnlock: An Automated Genetic Algorithm Framework forUnlocking Logic Encryption 2,019
Chen2019genunlock.pdf
Chen2020 article Huili Chen Seetal Potluri Farinaz Koushanfar ACM Transactions on Design Automation of Electronic Systems (TODAES) 4 Security of Microfluidic Biochip: Practical Attacks and Countermeasures 25 2,020 https://dl.acm.org/doi/10.1145/3382127
Chen2020.pdf
Chen2020ahec inproceedings Virtual event Huili Chen Rosario Cammarota Felipe Valencia Francesco Regazzoni Farinaz Koushanfar Design Automation Conference (DAC) 7 AHEC: End-to-end Compiler Framework for Privacy-preserving Machine Learning Acceleration 2,020
Chen2020ahec.pdf
Chen2020flowtrojan inproceedings Huili Chen Seetal Potluri Farinaz Koushanfar IEEE International NEWCAS Conference 6 FlowTrojan: Insertion and Detection of Hardware Trojans on Flow-Based Microfluidic Biochips 2,020
Chen2020flowtrojan.pdf
Chen2020flowtrojan inproceedings Huili Chen Seetal Potluri Farinaz Koushanfar IEEE International NEWCAS Conference 6 FlowTrojan: Insertion and Detection of Hardware Trojans on Flow-Based Microfluidic Biochips 2,020
Chen2020flowtrojan.pdf
Chen2020specmark conference Shanghai, China Huili Chen Bita Darvish Rouhani Farinaz Koushanfar INTERSPEECH 10 SpecMark: A Spectral Watermarking Framework for IP Protection of Speech Recognition Systems 2,020
Chen2020specmark.pdf
Chen2021DTRAP conference Huili Chen Cheng Fu Jishen Zhao Farinaz Koushanfar 10 ACM Digital Threats: Research and Practice (DTRAP) GALU: A Genetic Algorithm Framework for Logic Unlocking. ACM Digital Threats: Research and Practice (DTRAP) 2,021
2021DTRAP GALU CamVer.pdf
Chen2021ICCV conference Huili Chen Cheng Fu Jishen Zhao Farinaz Koushanfar 0 International Conference on Computer Vision (ICCV) ProFlip: Targeted Trojan Attack with Progressive Bit Flips. International Conference on Computer Vision (ICCV) 2,021 https://openaccess.thecvf.com/content/ICCV2021/html/Chen_ProFlip_Targeted_Trojan_Attack_With_Progressive_Bit_Flips_ICCV_2021_paper.html
2021ICCV_ProFlip_CamVer.pdf
Chung2015 article S. Chung J. Kong F. Koushanfar IEEE Transactions on Computers 8 An Energy-efficient Last-level Cache Architecture for Process Variation-tolerant 3D Microprocessors 64 2,015 10.1109/TC.2014.2378291 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6977972
Chung2015.pdf
Conf:alk07 inproceedings Y. Alkabani Farinaz Koushanfar USENIX Security Symposium 0 291-306 Active Hardware Metering for Intellectual Property Protection and Security 2,007 Conf:alk07.pdf
Demaut2015 conference Demmler, D. G. Dessouky F. Koushanfar Sadeghi, A. T. Schneider S. Zeitouni Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security 8 Automated Synthesis of Optimized Circuits for Secure Computation 2,015 10.1145/2810103.2813678 http://dl.acm.org/citation.cfm?id=2813678
Demaut2015.pdf
Dyer2011 inproceedings Eva Dyer Mehrdad Majzoobi Farinaz Koushanfar Design Automation Conference (DAC) 6 in press Hybrid Spatial Modeling of Non-Stationary Process Variations 2,011 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5981935
Dyer2011.pdf
Farinaz2013Power article Ulrich Rührmair Xiaolin Xu Jan Sölter Ahmed Mahmoud Farinaz Koushanfar Wayne Burleson 12 Cryptology ePrint Power and Timing Side Channels for PUFs and their Efficient Exploitation 2,013 https://eprint.iacr.org/2013/851 Farinaz2013Power.pdf
Feng2002 inproceedings J. Feng F. Koushanfar M. Potkonjak International Conference of Computer Design 0 226 - 231 System-Architectures for Sensor Networks Issues, Alternatives, and Directions 2,002
Feng2002.pdf
Ghasemzadeh2018 inproceedings Mohammad Ghasemzadeh Mohammad Samragh Farinaz Koushanfar The 26th IEEE International Symposium on Field-Programmable Custom Computing Machines 0 ReBNet: Residual Binarized Neural Network 2,018
Ghasemzadeh2018.pdf
Hashtag2021 conference Mojan Javaheripi Farinaz Koushanfar 11 IEEE/ACM International Conference On Computer Aided Design (ICCAD) HASHTAG: Hash Signatures for Online Detection of Fault-Injection Attacks on Deep Neural Networks 2,021 https://ieeexplore.ieee.org/abstract/document/9643556
Hashtag 2021.pdf
Herder2014 article Herder, Charles Yu, Meng-Day Farinaz Koushanfar Srinivas Devadas Proceedings of the IEEE 8 1126 - 1141 Physical Unclonable Functions and Applications: A Tutorial 102 2,014 10.1109/JPROC.2014.2320516 1558-2256 http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6823677
Herder2014.pdf
Hu2013 conference Kangqiao Hu Abdullah Nazma Nowroz Sherief Reda Farinaz Koushanfar Design, Automation \& Test in Europe (DATE) 3 High-Sensitivity Hardware Trojan Detection Using Multimodal Characterization 2,013 10.7873/DATE.2013.263 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6513709
Hu2013.pdf
Hussain2014 inproceedings Siam U. Hussain Sudha Yellapantula Mehrdad Majzoobi Farinaz Koushanfar International Conference on Computer-Aided Design 11 BIST-PUF: Online, Hardware-based Evaluation of Physically Unclonable Circuit Identifiers 2,014 dl.acm.org/citation.cfm?id=2691400
Hussain2014.pdf
Hussain2016 article Siam U. Hussain Mehrdad Majzoobi Farinaz Koushanfar 1-1 IEEE Transactions on Multi-Scale Computing Systems 1 A Built-In-Self-Test Scheme for Online Evaluation of Physical Unclonable Functions and True Random Number Generators 2 2,016 10.1109/TMSCS.2016.2519902 2332-7766 http://ieeexplore.ieee.org/xpl/abstractKeywords.jsp?tp=\&arnumber=7387751
Hussain2016.pdf
Hussain2016privacy inproceedings Siam U. Hussain Farinaz Koushanfar Design Automation Conference (DAC) 6 Privacy Preserving Localization for Smart Automotive Systems 2,016 http://dl.acm.org/citation.cfm?id=2898071
Hussain2016privacy.pdf
Hussain2018 inproceedings San Fransisco Siam U. Hussain Bita Darvish Rouhani Mohammad Ghasemzadeh Farinaz Koushanfar Design Automation Conference (DAC) 6 ACM ACM MAXelerator: FPGA Accelerator for Privacy Preserving Multiply-Accumulate (MAC) on Cloud Servers 2,018 10.1145/3195970.3196074 978-1-4503-5700-5 https://dl.acm.org/citation.cfm?id=3196074
Hussain2018.pdf
Hussain2018p3 article Siam U. Hussain Farinaz Koushanfar ACM Transactions on Design Automation of Electronic Systems (TODAES) 9 P3: Privacy Preserving Positioning for Smart Automotive Systems 23 2,018 https://doi.org/10.1145/3236625
Hussain2018p3.pdf
Hussain2018shaip article Siam U. Hussain M. Sadegh Riazi Farinaz Koushanfar ACM Transactions on Design Automation of Electronic Systems (TODAES) 9 SHAIP: Secure Hamming Distance for Authentication of Intrinsic PUFs 23 2,018 10.1145/3274669
Hussain2018shaip.pdf
Hussain2019 article Siam U. Hussain M. Sadegh Riazi Farinaz Koushanfar Preprint 0 The Fusion of Secure Function Evaluation and Logic Synthesis 2,019
Hussain2019.pdf
Hussain2019 article Siam U. Hussain M. Sadegh Riazi Farinaz Koushanfar Preprint 0 The Fusion of Secure Function Evaluation and Logic Synthesis 2,019
Hussain2019.pdf
Hussain2019fase inproceedings San Diego Siam U. Hussain Farinaz Koushanfar Field-Programmable Custom Computing Machines (FCCM) 4 FASE: FPGA Acceleration of Secure Function Evaluation 2,019
Hussain2019fase.pdf
Hussain2019fastwave inproceedings Colorado, USA Hussain, Shehzeen Mojan Javaheripi Neekhara, Paarth Kastner, Ryan Farinaz Koushanfar IEEE/ACM 2019 International Conference On Computer Aided Design (ICCAD) 11 ACM/SIGDA ACM/SIGDA FastWave: Accelerating Autoregressive Convolutional Neural Networks on FPGA 2,019 10.1109/ICCAD45719.2019.8942122 https://ieeexplore.ieee.org/document/8942122 Hussain2019fastwave.pdf
Hussain2019universal inproceedings Graz, Austria Hussain, Shehzeen Neekhara, Paarth P ey, Prakhar Dubnov, Shlomo McAuley, Julian Farinaz Koushanfar INTERSPEECH 2019 9 International Speech Communication Association (ISCA) International Speech Communication Association (ISCA) Universal Adversarial Perturbations for Speech Recognition Systems 2,019 10.21437/Interspeech.2019-1353 https://www.isca-speech.org/archive/Interspeech_2019/abstracts/1353.html
Hussain2019universal.pdf
Hussain2020 inproceedings Virtual Siam U. Hussain Baiyu Li F. Koushanfar Rosario Cammarota Workshop on Privacy-Preserving Machine Learning in Practice (PPMLP{\textquoteright}20) 9 ACM ACM TinyGarble2: Smart, Efficient, and Scalable Yao{\textquoteright}s Garble Circuit 2,020 10.1145/3411501.3419433
Hussain2020.pdf
Hussain2020adversarial inproceedings Hussain, Shehzeen Neekhara, Paarth Malhar Jere Farinaz Koushanfar McAuley, Julian IEEE Winter Conference on Applications of Computer Vision (WACV) 11 IEEE Computer Society IEEE Computer Society Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples 2,020 10.1109/WACV48630.2021.00339 https://openaccess.thecvf.com/content/WACV2021/html/Hussain_Adversarial_Deepfakes_Evaluating_Vulnerability_of_Deepfake_Detectors_to_Adversarial_Examples_WACV_2021_paper.html
Hussain2020adversarial.pdf
Hussain2021 conference Siam Umar Hussain Mojan Javaheripi Mohammad Samragh Farinaz Koushanfar 11 ACM SIGSAC Conference on Computer and Communications Security (CCS) COINN: Crypto/ML Codesign for Oblivious Inference via Neural Networks 2,021 https://dl.acm.org/doi/10.1145/3460120.3484797
COINN cameraReady.pdf
Hussain2021USENIX inproceedings Shehzeen Hussain Paarth Neekhara Shlomo Dubnov Julian McAuley Farinaz Koushanfar 30th {USENIX} Security Symposium ({USENIX} Security 21) USENIX Security 8 2273--2290 USENIX Association WaveGuard: Understanding and Mitigating Audio Adversarial Examples 2,021 978-1-939133-24-3 https://www.usenix.org/conference/usenixsecurity21/presentation/hussain
Usenixsec21-hussain.pdf
Imani2019 inproceedings Mohsen Imani Yeseong Kim M. Sadegh Riazi John Messerly Patric Liu Farinaz Koushanfar Tajana Rosing IEEE Cloud Computing (CLOUD) 8 IEEE IEEE A Framework for Collaborative Learning in Secure High-Dimensional Space 2,019 Imani2019.pdf
Javaheripi2019 inproceedings Mojan Javaheripi Mohammad Samragh Javidi, Tara Farinaz Koushanfar 6th ICML Workshop on Automated Machine Learning 6 ASCAI: Adaptive Sampling for acquiring Compact AI 2,019
Javaheripi2019.pdf
Javaheripi2019peeking article Mojan Javaheripi Mohammad Samragh Farinaz Koushanfar IEEE Solid-State Circuits Magazine 11 23-28 Peeking Into the Black Box: A Tutorial on Automated Design Optimization and Parameter Search 11 2,019
Javaheripi2019peeking.pdf
Javaheripi2020 inproceedings Mojan Javaheripi Mohammad Samragh Javidi, Tara Farinaz Koushanfar Genetic and Evolutionary Computation Conference (GECCO) 0 GeneCAI: Genetic Evolution for Acquiring Compact AI 2,020 https://doi.org/10.1145/3377930.3390226
Javaheripi2020.pdf
Javaheripi2020cleann inproceedings Mojan Javaheripi Mohammad Samragh Gregory Fields Javidi, Tara Farinaz Koushanfar International Conference On Computer Aided Design 11 ACM ACM CLEANN: Accelerated Trojan Shield for Embedded Neural Networks 2,020 10.1145/3400302.3415671 Deep Learning, Trojan Attack, AI Robustness, Embedded Systems, Sparse Recovery
Javaheripi2020cleann.pdf
Javaheripi2021XCL inproceedings Greg Fields Mohammad Samragh Mojan Javaheripi Farinaz Koushanfar Tara Javidi 6 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW) Trojan Signatures in DNN Weights 2,021
Fields Trojan Signatures.pdf
Kahevo2015 inproceedings A. B. Kahng F. Koushanfar IEEE/ACM International Conference on Computer-Aided Design (ICCAD) 11 Evolving EDA Beyond its E-Roots: An Overview 2,015 10.1109/ICCAD.2015.7372577 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7372577
Kahevo2015.pdf
Karri2014 article Ramesh Karri Farinaz Koushanfar Proceedings of the IEEE 8 1123-1125 Trustworthy Hardware 102 2,014 10.1109/JPROC.2014.2334837 1558-2256
Karri2014.pdf
Kiyavash2007 inproceedings N. Kiyavash F. Koushanfar IEEE Mobile Ad-hoc and Sensor Systems (MASS) 0 Anti-Collusion Position Estimation in Wireless Sensor Networks 2,007
Kiyavash2007.pdf
Kiyavash2013 article Kiyavash, Negar Farinaz Koushanfar Coleman, Todd P. Rodrigues, Mavis IEEE Transactions on Information Forensics and Security 3 477 - 487 A Timing Channel Spyware for the CSMA/CA Protocol 8 2,013 10.1109/TIFS.2013.2238930 http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6410028
Kiyavash2013.pdf
Kong2013 article Kong, Joonho Farinaz Koushanfar IEEE Transactions on Emerging Topics in Computing 11 Processor-Based Strong Physical Unclonable Functions with Aging-Based Response Tuning 2 2,013 10.1109/TETC.2013.2289385 http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6656920
Kong2013.pdf
Kong2014 inproceedings Kong, Joonho Farinaz Koushanfar Praveen K. Pendyala Ahmad-Reza Sadeghi Christian Wachsmann Design Automation Conference (DAC), Best paper candidate 6 PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs 2,014 http://dl.acm.org/citation.cfm?id=2593192
Kong2014.pdf
Koudas2015 inproceedings F. Koushanfar A. Mirhoseini G. Qu Z. Zhang IEEE/ACM International Conference on Computer-Aided Design (ICCAD) 11 DA Systemization of Knowledge: A Catalog of Prior Forward-Looking Initiatives 2,015 10.1109/ICCAD.2015.7372578 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7372578
Koudas2015.pdf
Koushanfar2000 inproceedings F. Koushanfar D. Kirovski M. Potkonjak IEEE/ACM International Conference on Computer Aided Design (ICCAD) 0 40 - 43 Symbolic Debugging Scheme for Optimized Hardware and Software 2,000
Koushanfar2000.pdf
Koushanfar2000processors inproceedings F. Koushanfar V. Prabhu M. Potkonjak J.M. Rabaey International Conference on Computer Designs (ICCD) 0 603 - 608 Processors for Mobile Applications 2,000
Koushanfar2000processors.pdf
Koushanfar2001 article F. Koushanfar D. Kirovski I. Hong M. Potkonjak M.C. Papaefthymiou IEEE Transactions on Computer-Aided Design (DAC) 0 392 - 401 Symbolic debugging of embedded hardware and software 20 2,001
Koushanfar2001.pdf
Koushanfar2001hardware inproceedings F. Koushanfar G. Qu Design Automation Conference (DAC) 0 490 - 493 Hardware Metering 2,001
Koushanfar2001hardware.pdf
Koushanfar2001intellectual inproceedings F. Koushanfar G. Qu M. Potkonjak Information Hiding Workshop (IHW) 0 81 - 95 Intellectual Property Metering 2,001
Koushanfar2001intellectual.pdf
Koushanfar2001iterative mastersthesis F. Koushanfar 0 Dept. of Electrical Engineering, University of California, Los Angeles Iterative error-tolerant location discovery in ad-hoc wireless sensor networks 2,001 Koushanfar2001iterative.pdf
Koushanfar2002 inproceedings Orlando, FL, USA Farinaz Koushanfar Slijepcevic, Sascha Wong, Jennifer M. Potkonjak Proceedings of ICASSP {\textquoteright}02IEEE International Conference on Acoustics Speech and Signal Processing 0 IEEE IV-4186 - IV-4186 IEEE Global error-tolerant algorithms for location discovery in ad-hoc wireless Netoworks 2,002 10.1109/ICASSP.2002.5745660 0-7803-7402-9 http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5745660 Koushanfar2002.pdf
Koushanfar2002error inproceedings F. Koushanfar S. Slijepcevic M. Potkonjak A. Sangiovanni-Vincentelli IEEE CAS Workshop on Wireless Communications and Networking 0 Error-Tolerant Multi-Modal Sensor Fusion 2,002
Koushanfar2002error.pdf
Koushanfar2002fault inproceedings F. Koushanfar M. Potkonjak A. Sangiovanni-Vincentelli IEEE Sensors 0 1491 - 1496 Fault tolerance techniques for wireless ad hoc sensor networks 2 2,002
Koushanfar2002fault.pdf
Koushanfar2002ilp inproceedings F. Koushanfar J. Wong J. Feng M. Potkonjak ACM/IEEE-CAS/EDAC Design Automation Conference (DAC) 0 910 - 915 ILP-based Engineering Change 2,002
Koushanfar2002ilp.pdf
Koushanfar2003 inproceedings F. Koushanfar A. Davare D. Nguyen M. Potkonjak A. Sangiovanni-Vincentelli ACM International Symposium on Low Power Electronics and Design (ISLPED) 0 475 - 480 Sleeping Coordination for Comprehensive Sensing Using Isotonic Regression and Domatic Partitions 2,003
Koushanfar2003.pdf
Koushanfar2003location inbook F. Koushanfar S. Slijepcevic M. Potkonjak A. Sangiovanni-Vincentelli Ad Hoc Wireless Networking X. Cheng X. Huang Du,D.Z. 0 Kluwer Kluwer Location Discovery in Ad-hoc Wireless Sensor Networks 2,003 Koushanfar2003location.pdf
Koushanfar2003low inproceedings F. Koushanfar A. Davare D. Nguyen M. Potkonjak A. Sangiovanni-Vincentelli ACM International Symposium on Low Power Electronics and Design (ISLPED) 0 475 - 480 Low Power Coordination in Wireless Ad-hoc Networks 2,003
Koushanfar2003low.pdf
Koushanfar2003on inproceedings F. Koushanfar M. Potkonjak A. Sangiovanni-Vincentelli IEEE Sensors 0 974 - 979 On-line fault detection of sensor measurements 2 2,003
Koushanfar2003on.pdf
Koushanfar2004 inproceedings F. Koushanfar M. Potkonjak A. Sangiovanni-Vincentelli IEEE Sensors 0 1472 - 1475 Error models for light sensors by statistical analysis of raw sensor measurements 2 2,004
Koushanfar2004.pdf
Koushanfar2005 article Farinaz Koushanfar Inki Hong Potkonjak, Miodrag ACM Trans. Design Automation of Electronic Sys. 0 523 - 545 Behavioral synthesis techniques for intellectual property protection 10 2,005
Koushanfar2005.pdf
Koushanfar2005ensuring mastersthesis F. Koushanfar 0 Dept. of Electrical Engineering and Computer Science, UC Berkeley Ensuring Data Integrity in Sensor-Based Networked Systems 2,005 Koushanfar2005ensuring.pdf
Koushanfar2005markov inproceedings F. Koushanfar M. Potkonjak IEEE Sensors 0 1430 - 1434 Markov chain-based models for missing and faulty data in MICA2 sensor motes 2,005
Koushanfar2005markov.pdf
Koushanfar2005sensor inbook F. Koushanfar M. Potkonjak J. Feng, Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems 0 CRC Press CRC Press Sensor Network Architecture 2,005
Koushanfar2005sensor.pdf
Koushanfar2005statistical mastersthesis F. Koushanfar 0 Dept. of Statistics, UC Berkeley Statistical modeling and recovery of intermittent sensor data streams 2,005 Koushanfar2005statistical.pdf
Koushanfar2006 inproceedings F. Koushanfar N. Kiyavash M. Potkonjak Proceedings of IEEE Sensors 0 888 - 891 Interacting Particle-based Model for Missing Data in Sensor Networks: Foundations and Applications 2,006
Koushanfar2006.pdf
Koushanfar2006watermarking inbook F. Koushanfar M. Potkonjak Security in Sensor Networks Y. Xiao 0 CRC Press CRC Press Watermarking Technique for Sensor Networks: Foundations and Applications 2,006 Koushanfar2006watermarking.pdf
Koushanfar2007 article F. Koushanfar A. Daware D. Nguyen M. Potkonjak A. Sangiovanni-Vincentelli ACM Transaction on Embedded Computing Systems 0 16 - 16 Techniques for Maintaining Connectivity Ad-hoc Networks Under Energy Constraints 6 2,007
Koushanfar2007.pdf
Koushanfar2007a inproceedings F. Koushanfar M. Potkonjak Design Automation Conference (DAC) 0 268 - 269 A general framework for spatial correlation modeling in VLSI design 2,007 Koushanfar2007a.pdf
Koushanfar2007cad inproceedings F. Koushanfar M. Potkonjak Design Automation Conference (DAC) 0 CAD-based Security, Cryptography, and Digital Rights Management 2,007
Koushanfar2007cad.pdf
Koushanfar2007hardware inproceedings F. Koushanfar M. Potkonjak IEEE International Conference on Microelectronic Systems Education 0 Hardware Security: Preparing Students for the Next Design Frontiers 2,007
Koushanfar2007hardware.pdf
Koushanfar2008 inproceedings F. Koushanfar P. Boufounos D. Shamsi International Conference on Computer Aided Design (ICCAD) 0 185 - 189 Post-silicon timing characterization by compressed sensing 2,008
Koushanfar2008.pdf
Koushanfar2009 article F. Koushanfar D. Shamsi Institute of Mathematical Statistics (IMS) Lecture Notes-Monograph Series (LNMS) 0 332 - 345 The challenges of model objective selection and estimation for ad-hoc network data sets 57 2,009
Koushanfar2009.pdf
Koushanfar2010 article Farinaz Koushanfar Mehrdad Majzoobi Potkonjak, Miodrag IEEE Trans. On Signal Processing 2 626 - 637 Nonparametric Combinatorial Regression for Shape Constrained Modeling 58 2,010 http://dl.acm.org/citation.cfm?id=1737518
Nonparametric Combinatorial Regression for Shape Constrained Modeling.pdf
Koushanfar2010a inproceedings Farinaz Koushanfar Azalia Mirhoseini Y. Alkabani Information Hiding Conference 5 A unified framework for multimodal submodular IC trojan detection 2,010 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5657256 Koushanfar2010a.pdf
Koushanfar2010hierarchical inproceedings F. Koushanfar Design Automation Conference (DAC) 6 Hierarchical hybrid power supply networks 2,010 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5523584
Koushanfar2010hierarchical.pdf
Koushanfar2010provably inproceedings F. Koushanfar Y. Alkabani International Symposium on Hardware-Oriented Security and Trust (HOST) 6 Provably secure obfuscation of diverse watermarks for sequential circuits 2,010 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5513115
Koushanfar2010provably.pdf
Koushanfar2011 inbook Farinaz Koushanfar Introduction to Hardware Security and Trust M. Tehranipoor C. Wang 0 Springer Springer Hardware Metering: A Survey. 2,011
Koushanfar2011.pdf
Koushanfar2011a article Farinaz Koushanfar Azalia Mirhoseini IEEE Transactions on Information Forensics and Security 3 1 162 -174 A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection 6 2,011 http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true\&arnumber=5657256\&tag=1
Koushanfar2011a.pdf

More...