View table: publication
< Cargo tables
Table structure:
- entry - String
- address - String
- annote - String
- author - List of String
- booktitle - String
- chapter - String
- edition - String
- editor - List of String
- howpublished - String
- institution - String
- journal - String
- month - Integer
- note - String
- number - String
- organization - String
- pages - String
- publisher - String
- school - String
- series - String
- title - String
- type - String
- volume - String
- year - Integer
- doi - String
- issn - String
- isbn - String
- url - String
- pdf - File
This table has 216 rows altogether.
Page | entry | address | annote | author | booktitle | chapter | edition | editor | howpublished | institution | journal | month | note | number | organization | pages | publisher | school | series | title | type | volume | year | doi | issn | isbn | url | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Abera2016 | inproceedings | Tigist Abera • N. Asokan • Lucas Davi • Farinaz Koushanfar • Andrew Paverd • Ahmad-Reza Sadeghi • Gene Tsudik | Design Automation Conference (DAC) | 6 | Things, Trouble, Trust: On Building Trust in IoT Systems | 2,016 | ||||||||||||||||||||||
Adans2020 | article | Mojan Javaheripi • Mohammad Samragh • Tara Javidi • Farinaz Koushanfar | 5 | IEEE Journal of Selected Topics in Signal Processing (JSTSP) | AdaNS: Adaptive Non-Uniform Sampling for Automated Design of Compact DNNs | 2,020 | https://ieeexplore.ieee.org/abstract/document/9086078 | |||||||||||||||||||||
Alkabani2007 | inproceedings | Y. Alkabani • Farinaz Koushanfar • Potkonjak, Miodrag | International Conference on Computer Aided Design (ICCAD) | 0 | 674 - 677 | Remote activation of ICs for piracy prevention and digital right management | 2,007 | |||||||||||||||||||||
Alkabani2008 | inproceedings | Anaheim, CA, USA | Yousra Alkabani • Farinaz Koushanfar | 2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)2008 IEEE International Workshop on Hardware-Oriented Security and Trust | 0 | IEEE | 82 - 83 | IEEE | Extended abstract: Designer{\textquoteright}s hardware Trojan horse | 2,008 | 10.1109/HST.2008.4559059 | 978-1-4244-2401-6 | http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4559059 | Alkabani2008.pdf | ||||||||||||||
Alkabani2008active | inproceedings | Y. Alkabani • F. Koushanfar | Compilers, Architectures, and Synthesis for Embedded Systems (CASES) | 0 | Active Control and Digital Rights Management of Integrated Circuit IP Cores | 2,008 | ||||||||||||||||||||||
Alkabani2008input | article | Y. Alkabani • T. Massey • F. Koushanfar • M. Potkonjak | Rice University, Electrical and Computer Engineering Department | 0 | Input Vector Control for Post-Silicon Leakage Current Minimization under Manufacturing Variations | 2,008 | ||||||||||||||||||||||
Alkabani2008n | inproceedings | Y. Alkabani • F. Koushanfar | Design Automation Conference (DAC) | 0 | 546 - 551 | N-variant IC design: methodology and applications | 2,008 | |||||||||||||||||||||
Alkabani2008trusted | inproceedings | Y. Alkabani • F. Koushanfar • N. Kiyavash • M. Potkonjak | Information Hiding (IH) | 0 | 102 - 117 | Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach | 2,008 | Alkabani2008trusted.pdf | ||||||||||||||||||||
Alkabani2009 | inproceedings | Y. Alkabani • F. Koushanfar • M. Potkonjak | International Symposium on Low Power Electronics and Designs (ISLPED) | 0 | 331 - 334 | N-version temperature-aware scheduling and binding | 2,009 | |||||||||||||||||||||
Alkabani2009consistency | inproceedings | Y. Alkabani • Farinaz Koushanfar | IEEE/ACM International Conference on Computer Aided Design (ICCAD) | 0 | 123-127 | Consistency-based characterization for IC Trojan detection | 2,009 | http://doi.acm.org/10.1145/1687399.1687426 | ||||||||||||||||||||
Autorank2021 | article | Mojan Javaheripi • Mohammad Samragh • Farinaz Koushanfar | 12 | IEEE Journal on Emerging and Selected Topics in Circuits and Systems | AutoRank: Automated Rank Selection for Effective Neural Network Customization | 2,021 | https://ieeexplore.ieee.org/abstract/document/9611209 | |||||||||||||||||||||
C2009 | inproceedings | San Francisco, CA, USA | C • ore, Andrea • Kocabas, Ovunc • Farinaz Koushanfar | 2009 IEEE International Workshop on Hardware-Oriented Security and Trust2009 IEEE International Workshop on Hardware-Oriented Security and Trust | 0 | IEEE | 43 - 49 | IEEE | Robust stable radiometric fingerprinting for wireless devices | 2,009 | 10.1109/HST.2009.5224969 | 978-1-4244-4805-0 | http://www.computer.org/csdl/proceedings/hst/2009/4805/00/05224969-abs.html | |||||||||||||||
Caldwell2000 | inproceedings | Los Angeles, California, United StatesNew York, New York, USA | Caldwell, Andrew E. • Yu Cao • Kahng, Andrew B. • Farinaz Koushanfar • Lu, Hua • Igor L. Markov • Oliver, Michael • Stroob • t, Dirk • Sylvester, Dennis | the 37th conferenceProceedings of the 37th conference on Design automation - DAC {\textquoteright}00 | 0 | ACM Press | 693 - 698 | ACM Press | GTX: The MARCO GSRC Technology Extrapolation System | 2,000 | 10.1145/337292.337617 | 1581131879 | http://dl.acm.org/citation.cfm?doid=337292.337617 | Caldwell2000.pdf | ||||||||||||||
Chatterjee2019 | inproceedings | Rahul Chatterjee • M. Sadegh Riazi • Tanmoy Chowdhury • Emanuela Marasco • Farinaz Koushanfar • Ari Juels | ACM CCS | 11 | ACM | ACM | Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms | 2,019 | ||||||||||||||||||||
Chen2013 | article | Chen, Yen-Kuang • Wu, An-Yeu • Bayoumi, Magdy A. • Farinaz Koushanfar | IEEE Journal on Emerging and Selected Topics in Circuits and Systems | 3 | 1 - 4 | Editorial Low-Power, Intelligent, and Secure Solutions for Realization of Internet of Things | 3 | 2,013 | 10.1109/JETCAS.2013.2244771 | http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6472113 | ||||||||||||||||||
Chen2017 | inproceedings | Boston, MA, USA | Huili Chen • Seetal Potluri • Farinaz Koushanfar | IEEE International Conference on Computer Design (ICCD) | 11 | IEEE | IEEE | BioChipWork: Reverse Engineering of Microfluidic Biochips | 2,017 | 10.1109/ICCD.2017.11 | 978-1-5386-2255-1 | 978-1-5386-2254-4 | https://ieeexplore.ieee.org/abstract/document/8119184/ | |||||||||||||||
Chen2018 | inproceedings | Huili Chen • Bita Darvish Rouhani • Farinaz Koushanfar | 0 | DeepMarks: A Digital Fingerprinting Framework for Deep Neural Networks | 2,018 | https://arxiv.org/abs/1804.03648 | ||||||||||||||||||||||
Chen2019 | conference | Huili Chen • Bita Darvish Rouhani • Cheng Fu • Jishen Zhao • Farinaz Koushanfar | ACM International Conference on Multimedia Retrieval (ICMR) | 0 | ACM | DeepMarks: A Secure Fingerprinting Framework for Digital Rights Management of Deep Learning Models | 2,019 | |||||||||||||||||||||
Chen2019deepattest | inproceedings | Huili Chen • Cheng Fu • Bita Darvish Rouhani • Jishen Zhao • Farinaz Koushanfar | International Symposium on Computer Architecture (ISCA) | 6 | DeepAttest: An End-to-End Attestation Framework for Deep Neural Networks | 2,019 | ||||||||||||||||||||||
Chen2019deepinspect | inproceedings | Macao, China | Huili Chen • Cheng Fu • Jishen Zhao • Farinaz Koushanfar | International Joint Conference on Artificial Intelligence (IJCAI) | 8 | DeepInspect: A Black-box Trojan Detection and Mitigation Framework for Deep Neural Networks | 2,019 | |||||||||||||||||||||
Chen2019genunlock | conference | Westminster, CO | Huili Chen • Cheng Fu • Jishen Zhao • Farinaz Koushanfar | International Conference On Computer Aided Design (ICCAD) | 11 | GenUnlock: An Automated Genetic Algorithm Framework forUnlocking Logic Encryption | 2,019 | |||||||||||||||||||||
Chen2020 | article | Huili Chen • Seetal Potluri • Farinaz Koushanfar | ACM Transactions on Design Automation of Electronic Systems (TODAES) | 4 | Security of Microfluidic Biochip: Practical Attacks and Countermeasures | 25 | 2,020 | https://dl.acm.org/doi/10.1145/3382127 | ||||||||||||||||||||
Chen2020ahec | inproceedings | Virtual event | Huili Chen • Rosario Cammarota • Felipe Valencia • Francesco Regazzoni • Farinaz Koushanfar | Design Automation Conference (DAC) | 7 | AHEC: End-to-end Compiler Framework for Privacy-preserving Machine Learning Acceleration | 2,020 | |||||||||||||||||||||
Chen2020flowtrojan | inproceedings | Huili Chen • Seetal Potluri • Farinaz Koushanfar | IEEE International NEWCAS Conference | 6 | FlowTrojan: Insertion and Detection of Hardware Trojans on Flow-Based Microfluidic Biochips | 2,020 | ||||||||||||||||||||||
Chen2020flowtrojan | inproceedings | Huili Chen • Seetal Potluri • Farinaz Koushanfar | IEEE International NEWCAS Conference | 6 | FlowTrojan: Insertion and Detection of Hardware Trojans on Flow-Based Microfluidic Biochips | 2,020 | ||||||||||||||||||||||
Chen2020specmark | conference | Shanghai, China | Huili Chen • Bita Darvish Rouhani • Farinaz Koushanfar | INTERSPEECH | 10 | SpecMark: A Spectral Watermarking Framework for IP Protection of Speech Recognition Systems | 2,020 | |||||||||||||||||||||
Chen2021DTRAP | conference | Huili Chen • Cheng Fu • Jishen Zhao • Farinaz Koushanfar | 10 | ACM Digital Threats: Research and Practice (DTRAP) | GALU: A Genetic Algorithm Framework for Logic Unlocking. ACM Digital Threats: Research and Practice (DTRAP) | 2,021 | ||||||||||||||||||||||
Chen2021ICCV | conference | Huili Chen • Cheng Fu • Jishen Zhao • Farinaz Koushanfar | 0 | International Conference on Computer Vision (ICCV) | ProFlip: Targeted Trojan Attack with Progressive Bit Flips. International Conference on Computer Vision (ICCV) | 2,021 | https://openaccess.thecvf.com/content/ICCV2021/html/Chen_ProFlip_Targeted_Trojan_Attack_With_Progressive_Bit_Flips_ICCV_2021_paper.html | |||||||||||||||||||||
Chung2015 | article | S. Chung • J. Kong • F. Koushanfar | IEEE Transactions on Computers | 8 | An Energy-efficient Last-level Cache Architecture for Process Variation-tolerant 3D Microprocessors | 64 | 2,015 | 10.1109/TC.2014.2378291 | http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6977972 | |||||||||||||||||||
Conf:alk07 | inproceedings | Y. Alkabani • Farinaz Koushanfar | USENIX Security Symposium | 0 | 291-306 | Active Hardware Metering for Intellectual Property Protection and Security | 2,007 | Conf:alk07.pdf | ||||||||||||||||||||
Demaut2015 | conference | Demmler, D. • G. Dessouky • F. Koushanfar • Sadeghi, A. • T. Schneider • S. Zeitouni | Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security | 8 | Automated Synthesis of Optimized Circuits for Secure Computation | 2,015 | 10.1145/2810103.2813678 | http://dl.acm.org/citation.cfm?id=2813678 | ||||||||||||||||||||
Dyer2011 | inproceedings | Eva Dyer • Mehrdad Majzoobi • Farinaz Koushanfar | Design Automation Conference (DAC) | 6 | in press | Hybrid Spatial Modeling of Non-Stationary Process Variations | 2,011 | http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5981935 | ||||||||||||||||||||
Farinaz2013Power | article | Ulrich Rührmair • Xiaolin Xu • Jan Sölter • Ahmed Mahmoud • Farinaz Koushanfar • Wayne Burleson | 12 | Cryptology ePrint | Power and Timing Side Channels for PUFs and their Efficient Exploitation | 2,013 | https://eprint.iacr.org/2013/851 | Farinaz2013Power.pdf | ||||||||||||||||||||
Feng2002 | inproceedings | J. Feng • F. Koushanfar • M. Potkonjak | International Conference of Computer Design | 0 | 226 - 231 | System-Architectures for Sensor Networks Issues, Alternatives, and Directions | 2,002 | |||||||||||||||||||||
Ghasemzadeh2018 | inproceedings | Mohammad Ghasemzadeh • Mohammad Samragh • Farinaz Koushanfar | The 26th IEEE International Symposium on Field-Programmable Custom Computing Machines | 0 | ReBNet: Residual Binarized Neural Network | 2,018 | ||||||||||||||||||||||
Hashtag2021 | conference | Mojan Javaheripi • Farinaz Koushanfar | 11 | IEEE/ACM International Conference On Computer Aided Design (ICCAD) | HASHTAG: Hash Signatures for Online Detection of Fault-Injection Attacks on Deep Neural Networks | 2,021 | https://ieeexplore.ieee.org/abstract/document/9643556 | |||||||||||||||||||||
Herder2014 | article | Herder, Charles • Yu, Meng-Day • Farinaz Koushanfar • Srinivas Devadas | Proceedings of the IEEE | 8 | 1126 - 1141 | Physical Unclonable Functions and Applications: A Tutorial | 102 | 2,014 | 10.1109/JPROC.2014.2320516 | 1558-2256 | http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6823677 | |||||||||||||||||
Hu2013 | conference | Kangqiao Hu • Abdullah Nazma Nowroz • Sherief Reda • Farinaz Koushanfar | Design, Automation \& Test in Europe (DATE) | 3 | High-Sensitivity Hardware Trojan Detection Using Multimodal Characterization | 2,013 | 10.7873/DATE.2013.263 | http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6513709 | ||||||||||||||||||||
Hussain2014 | inproceedings | Siam U. Hussain • Sudha Yellapantula • Mehrdad Majzoobi • Farinaz Koushanfar | International Conference on Computer-Aided Design | 11 | BIST-PUF: Online, Hardware-based Evaluation of Physically Unclonable Circuit Identifiers | 2,014 | dl.acm.org/citation.cfm?id=2691400 | |||||||||||||||||||||
Hussain2016 | article | Siam U. Hussain • Mehrdad Majzoobi • Farinaz Koushanfar | 1-1 | IEEE Transactions on Multi-Scale Computing Systems | 1 | A Built-In-Self-Test Scheme for Online Evaluation of Physical Unclonable Functions and True Random Number Generators | 2 | 2,016 | 10.1109/TMSCS.2016.2519902 | 2332-7766 | http://ieeexplore.ieee.org/xpl/abstractKeywords.jsp?tp=\&arnumber=7387751 | |||||||||||||||||
Hussain2016privacy | inproceedings | Siam U. Hussain • Farinaz Koushanfar | Design Automation Conference (DAC) | 6 | Privacy Preserving Localization for Smart Automotive Systems | 2,016 | http://dl.acm.org/citation.cfm?id=2898071 | |||||||||||||||||||||
Hussain2018 | inproceedings | San Fransisco | Siam U. Hussain • Bita Darvish Rouhani • Mohammad Ghasemzadeh • Farinaz Koushanfar | Design Automation Conference (DAC) | 6 | ACM | ACM | MAXelerator: FPGA Accelerator for Privacy Preserving Multiply-Accumulate (MAC) on Cloud Servers | 2,018 | 10.1145/3195970.3196074 | 978-1-4503-5700-5 | https://dl.acm.org/citation.cfm?id=3196074 | ||||||||||||||||
Hussain2018p3 | article | Siam U. Hussain • Farinaz Koushanfar | ACM Transactions on Design Automation of Electronic Systems (TODAES) | 9 | P3: Privacy Preserving Positioning for Smart Automotive Systems | 23 | 2,018 | https://doi.org/10.1145/3236625 | ||||||||||||||||||||
Hussain2018shaip | article | Siam U. Hussain • M. Sadegh Riazi • Farinaz Koushanfar | ACM Transactions on Design Automation of Electronic Systems (TODAES) | 9 | SHAIP: Secure Hamming Distance for Authentication of Intrinsic PUFs | 23 | 2,018 | 10.1145/3274669 | ||||||||||||||||||||
Hussain2019 | article | Siam U. Hussain • M. Sadegh Riazi • Farinaz Koushanfar | Preprint | 0 | The Fusion of Secure Function Evaluation and Logic Synthesis | 2,019 | ||||||||||||||||||||||
Hussain2019 | article | Siam U. Hussain • M. Sadegh Riazi • Farinaz Koushanfar | Preprint | 0 | The Fusion of Secure Function Evaluation and Logic Synthesis | 2,019 | ||||||||||||||||||||||
Hussain2019fase | inproceedings | San Diego | Siam U. Hussain • Farinaz Koushanfar | Field-Programmable Custom Computing Machines (FCCM) | 4 | FASE: FPGA Acceleration of Secure Function Evaluation | 2,019 | |||||||||||||||||||||
Hussain2019fastwave | inproceedings | Colorado, USA | Hussain, Shehzeen • Mojan Javaheripi • Neekhara, Paarth • Kastner, Ryan • Farinaz Koushanfar | IEEE/ACM 2019 International Conference On Computer Aided Design (ICCAD) | 11 | ACM/SIGDA | ACM/SIGDA | FastWave: Accelerating Autoregressive Convolutional Neural Networks on FPGA | 2,019 | 10.1109/ICCAD45719.2019.8942122 | https://ieeexplore.ieee.org/document/8942122 | Hussain2019fastwave.pdf | ||||||||||||||||
Hussain2019universal | inproceedings | Graz, Austria | Hussain, Shehzeen • Neekhara, Paarth • P • ey, Prakhar • Dubnov, Shlomo • McAuley, Julian • Farinaz Koushanfar | INTERSPEECH 2019 | 9 | International Speech Communication Association (ISCA) | International Speech Communication Association (ISCA) | Universal Adversarial Perturbations for Speech Recognition Systems | 2,019 | 10.21437/Interspeech.2019-1353 | https://www.isca-speech.org/archive/Interspeech_2019/abstracts/1353.html | |||||||||||||||||
Hussain2020 | inproceedings | Virtual | Siam U. Hussain • Baiyu Li • F. Koushanfar • Rosario Cammarota | Workshop on Privacy-Preserving Machine Learning in Practice (PPMLP{\textquoteright}20) | 9 | ACM | ACM | TinyGarble2: Smart, Efficient, and Scalable Yao{\textquoteright}s Garble Circuit | 2,020 | 10.1145/3411501.3419433 | ||||||||||||||||||
Hussain2020adversarial | inproceedings | Hussain, Shehzeen • Neekhara, Paarth • Malhar Jere • Farinaz Koushanfar • McAuley, Julian | IEEE Winter Conference on Applications of Computer Vision (WACV) | 11 | IEEE Computer Society | IEEE Computer Society | Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples | 2,020 | 10.1109/WACV48630.2021.00339 | https://openaccess.thecvf.com/content/WACV2021/html/Hussain_Adversarial_Deepfakes_Evaluating_Vulnerability_of_Deepfake_Detectors_to_Adversarial_Examples_WACV_2021_paper.html | ||||||||||||||||||
Hussain2021 | conference | Siam Umar Hussain • Mojan Javaheripi • Mohammad Samragh • Farinaz Koushanfar | 11 | ACM SIGSAC Conference on Computer and Communications Security (CCS) | COINN: Crypto/ML Codesign for Oblivious Inference via Neural Networks | 2,021 | https://dl.acm.org/doi/10.1145/3460120.3484797 | |||||||||||||||||||||
Hussain2021USENIX | inproceedings | Shehzeen Hussain • Paarth Neekhara • Shlomo Dubnov • Julian McAuley • Farinaz Koushanfar | 30th {USENIX} Security Symposium ({USENIX} Security 21) | USENIX Security | 8 | 2273--2290 | USENIX Association | WaveGuard: Understanding and Mitigating Audio Adversarial Examples | 2,021 | 978-1-939133-24-3 | https://www.usenix.org/conference/usenixsecurity21/presentation/hussain | |||||||||||||||||
Imani2019 | inproceedings | Mohsen Imani • Yeseong Kim • M. Sadegh Riazi • John Messerly • Patric Liu • Farinaz Koushanfar • Tajana Rosing | IEEE Cloud Computing (CLOUD) | 8 | IEEE | IEEE | A Framework for Collaborative Learning in Secure High-Dimensional Space | 2,019 | Imani2019.pdf | |||||||||||||||||||
Javaheripi2019 | inproceedings | Mojan Javaheripi • Mohammad Samragh • Javidi, Tara • Farinaz Koushanfar | 6th ICML Workshop on Automated Machine Learning | 6 | ASCAI: Adaptive Sampling for acquiring Compact AI | 2,019 | ||||||||||||||||||||||
Javaheripi2019peeking | article | Mojan Javaheripi • Mohammad Samragh • Farinaz Koushanfar | IEEE Solid-State Circuits Magazine | 11 | 23-28 | Peeking Into the Black Box: A Tutorial on Automated Design Optimization and Parameter Search | 11 | 2,019 | ||||||||||||||||||||
Javaheripi2020 | inproceedings | Mojan Javaheripi • Mohammad Samragh • Javidi, Tara • Farinaz Koushanfar | Genetic and Evolutionary Computation Conference (GECCO) | 0 | GeneCAI: Genetic Evolution for Acquiring Compact AI | 2,020 | https://doi.org/10.1145/3377930.3390226 | |||||||||||||||||||||
Javaheripi2020cleann | inproceedings | Mojan Javaheripi • Mohammad Samragh • Gregory Fields • Javidi, Tara • Farinaz Koushanfar | International Conference On Computer Aided Design | 11 | ACM | ACM | CLEANN: Accelerated Trojan Shield for Embedded Neural Networks | 2,020 | 10.1145/3400302.3415671 | Deep Learning, Trojan Attack, AI Robustness, Embedded Systems, Sparse Recovery | ||||||||||||||||||
Javaheripi2021XCL | inproceedings | Greg Fields • Mohammad Samragh • Mojan Javaheripi • Farinaz Koushanfar • Tara Javidi | 6 | IEEE/CVF International Conference on Computer Vision Workshops (ICCVW) | Trojan Signatures in DNN Weights | 2,021 | ||||||||||||||||||||||
Kahevo2015 | inproceedings | A. B. Kahng • F. Koushanfar | IEEE/ACM International Conference on Computer-Aided Design (ICCAD) | 11 | Evolving EDA Beyond its E-Roots: An Overview | 2,015 | 10.1109/ICCAD.2015.7372577 | http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7372577 | ||||||||||||||||||||
Karri2014 | article | Ramesh Karri • Farinaz Koushanfar | Proceedings of the IEEE | 8 | 1123-1125 | Trustworthy Hardware | 102 | 2,014 | 10.1109/JPROC.2014.2334837 | 1558-2256 | ||||||||||||||||||
Kiyavash2007 | inproceedings | N. Kiyavash • F. Koushanfar | IEEE Mobile Ad-hoc and Sensor Systems (MASS) | 0 | Anti-Collusion Position Estimation in Wireless Sensor Networks | 2,007 | ||||||||||||||||||||||
Kiyavash2013 | article | Kiyavash, Negar • Farinaz Koushanfar • Coleman, Todd P. • Rodrigues, Mavis | IEEE Transactions on Information Forensics and Security | 3 | 477 - 487 | A Timing Channel Spyware for the CSMA/CA Protocol | 8 | 2,013 | 10.1109/TIFS.2013.2238930 | http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6410028 | ||||||||||||||||||
Kong2013 | article | Kong, Joonho • Farinaz Koushanfar | IEEE Transactions on Emerging Topics in Computing | 11 | Processor-Based Strong Physical Unclonable Functions with Aging-Based Response Tuning | 2 | 2,013 | 10.1109/TETC.2013.2289385 | http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6656920 | |||||||||||||||||||
Kong2014 | inproceedings | Kong, Joonho • Farinaz Koushanfar • Praveen K. Pendyala • Ahmad-Reza Sadeghi • Christian Wachsmann | Design Automation Conference (DAC), Best paper candidate | 6 | PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs | 2,014 | http://dl.acm.org/citation.cfm?id=2593192 | |||||||||||||||||||||
Koudas2015 | inproceedings | F. Koushanfar • A. Mirhoseini • G. Qu • Z. Zhang | IEEE/ACM International Conference on Computer-Aided Design (ICCAD) | 11 | DA Systemization of Knowledge: A Catalog of Prior Forward-Looking Initiatives | 2,015 | 10.1109/ICCAD.2015.7372578 | http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7372578 | ||||||||||||||||||||
Koushanfar2000 | inproceedings | F. Koushanfar • D. Kirovski • M. Potkonjak | IEEE/ACM International Conference on Computer Aided Design (ICCAD) | 0 | 40 - 43 | Symbolic Debugging Scheme for Optimized Hardware and Software | 2,000 | |||||||||||||||||||||
Koushanfar2000processors | inproceedings | F. Koushanfar • V. Prabhu • M. Potkonjak • J.M. Rabaey | International Conference on Computer Designs (ICCD) | 0 | 603 - 608 | Processors for Mobile Applications | 2,000 | |||||||||||||||||||||
Koushanfar2001 | article | F. Koushanfar • D. Kirovski • I. Hong • M. Potkonjak • M.C. Papaefthymiou | IEEE Transactions on Computer-Aided Design (DAC) | 0 | 392 - 401 | Symbolic debugging of embedded hardware and software | 20 | 2,001 | ||||||||||||||||||||
Koushanfar2001hardware | inproceedings | F. Koushanfar • G. Qu | Design Automation Conference (DAC) | 0 | 490 - 493 | Hardware Metering | 2,001 | |||||||||||||||||||||
Koushanfar2001intellectual | inproceedings | F. Koushanfar • G. Qu • M. Potkonjak | Information Hiding Workshop (IHW) | 0 | 81 - 95 | Intellectual Property Metering | 2,001 | |||||||||||||||||||||
Koushanfar2001iterative | mastersthesis | F. Koushanfar | 0 | Dept. of Electrical Engineering, University of California, Los Angeles | Iterative error-tolerant location discovery in ad-hoc wireless sensor networks | 2,001 | Koushanfar2001iterative.pdf | |||||||||||||||||||||
Koushanfar2002 | inproceedings | Orlando, FL, USA | Farinaz Koushanfar • Slijepcevic, Sascha • Wong, Jennifer • M. Potkonjak | Proceedings of ICASSP {\textquoteright}02IEEE International Conference on Acoustics Speech and Signal Processing | 0 | IEEE | IV-4186 - IV-4186 | IEEE | Global error-tolerant algorithms for location discovery in ad-hoc wireless Netoworks | 2,002 | 10.1109/ICASSP.2002.5745660 | 0-7803-7402-9 | http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5745660 | Koushanfar2002.pdf | ||||||||||||||
Koushanfar2002error | inproceedings | F. Koushanfar • S. Slijepcevic • M. Potkonjak • A. Sangiovanni-Vincentelli | IEEE CAS Workshop on Wireless Communications and Networking | 0 | Error-Tolerant Multi-Modal Sensor Fusion | 2,002 | ||||||||||||||||||||||
Koushanfar2002fault | inproceedings | F. Koushanfar • M. Potkonjak • A. Sangiovanni-Vincentelli | IEEE Sensors | 0 | 1491 - 1496 | Fault tolerance techniques for wireless ad hoc sensor networks | 2 | 2,002 | ||||||||||||||||||||
Koushanfar2002ilp | inproceedings | F. Koushanfar • J. Wong • J. Feng • M. Potkonjak | ACM/IEEE-CAS/EDAC Design Automation Conference (DAC) | 0 | 910 - 915 | ILP-based Engineering Change | 2,002 | |||||||||||||||||||||
Koushanfar2003 | inproceedings | F. Koushanfar • A. Davare • D. Nguyen • M. Potkonjak • A. Sangiovanni-Vincentelli | ACM International Symposium on Low Power Electronics and Design (ISLPED) | 0 | 475 - 480 | Sleeping Coordination for Comprehensive Sensing Using Isotonic Regression and Domatic Partitions | 2,003 | |||||||||||||||||||||
Koushanfar2003location | inbook | F. Koushanfar • S. Slijepcevic • M. Potkonjak • A. Sangiovanni-Vincentelli | Ad Hoc Wireless Networking | X. Cheng • X. Huang • Du,D.Z. | 0 | Kluwer | Kluwer | Location Discovery in Ad-hoc Wireless Sensor Networks | 2,003 | Koushanfar2003location.pdf | ||||||||||||||||||
Koushanfar2003low | inproceedings | F. Koushanfar • A. Davare • D. Nguyen • M. Potkonjak • A. Sangiovanni-Vincentelli | ACM International Symposium on Low Power Electronics and Design (ISLPED) | 0 | 475 - 480 | Low Power Coordination in Wireless Ad-hoc Networks | 2,003 | |||||||||||||||||||||
Koushanfar2003on | inproceedings | F. Koushanfar • M. Potkonjak • A. Sangiovanni-Vincentelli | IEEE Sensors | 0 | 974 - 979 | On-line fault detection of sensor measurements | 2 | 2,003 | ||||||||||||||||||||
Koushanfar2004 | inproceedings | F. Koushanfar • M. Potkonjak • A. Sangiovanni-Vincentelli | IEEE Sensors | 0 | 1472 - 1475 | Error models for light sensors by statistical analysis of raw sensor measurements | 2 | 2,004 | ||||||||||||||||||||
Koushanfar2005 | article | Farinaz Koushanfar • Inki Hong • Potkonjak, Miodrag | ACM Trans. Design Automation of Electronic Sys. | 0 | 523 - 545 | Behavioral synthesis techniques for intellectual property protection | 10 | 2,005 | ||||||||||||||||||||
Koushanfar2005ensuring | mastersthesis | F. Koushanfar | 0 | Dept. of Electrical Engineering and Computer Science, UC Berkeley | Ensuring Data Integrity in Sensor-Based Networked Systems | 2,005 | Koushanfar2005ensuring.pdf | |||||||||||||||||||||
Koushanfar2005markov | inproceedings | F. Koushanfar • M. Potkonjak | IEEE Sensors | 0 | 1430 - 1434 | Markov chain-based models for missing and faulty data in MICA2 sensor motes | 2,005 | |||||||||||||||||||||
Koushanfar2005sensor | inbook | F. Koushanfar • M. Potkonjak • J. Feng, | Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems | 0 | CRC Press | CRC Press | Sensor Network Architecture | 2,005 | ||||||||||||||||||||
Koushanfar2005statistical | mastersthesis | F. Koushanfar | 0 | Dept. of Statistics, UC Berkeley | Statistical modeling and recovery of intermittent sensor data streams | 2,005 | Koushanfar2005statistical.pdf | |||||||||||||||||||||
Koushanfar2006 | inproceedings | F. Koushanfar • N. Kiyavash • M. Potkonjak | Proceedings of IEEE Sensors | 0 | 888 - 891 | Interacting Particle-based Model for Missing Data in Sensor Networks: Foundations and Applications | 2,006 | |||||||||||||||||||||
Koushanfar2006watermarking | inbook | F. Koushanfar • M. Potkonjak | Security in Sensor Networks | Y. Xiao | 0 | CRC Press | CRC Press | Watermarking Technique for Sensor Networks: Foundations and Applications | 2,006 | Koushanfar2006watermarking.pdf | ||||||||||||||||||
Koushanfar2007 | article | F. Koushanfar • A. Daware • D. Nguyen • M. Potkonjak • A. Sangiovanni-Vincentelli | ACM Transaction on Embedded Computing Systems | 0 | 16 - 16 | Techniques for Maintaining Connectivity Ad-hoc Networks Under Energy Constraints | 6 | 2,007 | ||||||||||||||||||||
Koushanfar2007a | inproceedings | F. Koushanfar • M. Potkonjak | Design Automation Conference (DAC) | 0 | 268 - 269 | A general framework for spatial correlation modeling in VLSI design | 2,007 | Koushanfar2007a.pdf | ||||||||||||||||||||
Koushanfar2007cad | inproceedings | F. Koushanfar • M. Potkonjak | Design Automation Conference (DAC) | 0 | CAD-based Security, Cryptography, and Digital Rights Management | 2,007 | ||||||||||||||||||||||
Koushanfar2007hardware | inproceedings | F. Koushanfar • M. Potkonjak | IEEE International Conference on Microelectronic Systems Education | 0 | Hardware Security: Preparing Students for the Next Design Frontiers | 2,007 | ||||||||||||||||||||||
Koushanfar2008 | inproceedings | F. Koushanfar • P. Boufounos • D. Shamsi | International Conference on Computer Aided Design (ICCAD) | 0 | 185 - 189 | Post-silicon timing characterization by compressed sensing | 2,008 | |||||||||||||||||||||
Koushanfar2009 | article | F. Koushanfar • D. Shamsi | Institute of Mathematical Statistics (IMS) Lecture Notes-Monograph Series (LNMS) | 0 | 332 - 345 | The challenges of model objective selection and estimation for ad-hoc network data sets | 57 | 2,009 | ||||||||||||||||||||
Koushanfar2010 | article | Farinaz Koushanfar • Mehrdad Majzoobi • Potkonjak, Miodrag | IEEE Trans. On Signal Processing | 2 | 626 - 637 | Nonparametric Combinatorial Regression for Shape Constrained Modeling | 58 | 2,010 | http://dl.acm.org/citation.cfm?id=1737518 | |||||||||||||||||||
Koushanfar2010a | inproceedings | Farinaz Koushanfar • Azalia Mirhoseini • Y. Alkabani | Information Hiding Conference | 5 | A unified framework for multimodal submodular IC trojan detection | 2,010 | http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5657256 | Koushanfar2010a.pdf | ||||||||||||||||||||
Koushanfar2010hierarchical | inproceedings | F. Koushanfar | Design Automation Conference (DAC) | 6 | Hierarchical hybrid power supply networks | 2,010 | http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5523584 | |||||||||||||||||||||
Koushanfar2010provably | inproceedings | F. Koushanfar • Y. Alkabani | International Symposium on Hardware-Oriented Security and Trust (HOST) | 6 | Provably secure obfuscation of diverse watermarks for sequential circuits | 2,010 | http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5513115 | |||||||||||||||||||||
Koushanfar2011 | inbook | Farinaz Koushanfar | Introduction to Hardware Security and Trust | M. Tehranipoor • C. Wang | 0 | Springer | Springer | Hardware Metering: A Survey. | 2,011 | |||||||||||||||||||
Koushanfar2011a | article | Farinaz Koushanfar • Azalia Mirhoseini | IEEE Transactions on Information Forensics and Security | 3 | 1 | 162 -174 | A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection | 6 | 2,011 | http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true\&arnumber=5657256\&tag=1 |