Search Results - "Arafin, Md Tanvir"
-
1
Approximate computing for low power and security in the Internet of Things
Published in Computer (Long Beach, Calif.) (2017)“…To save resources for Internet of Things (IoT) devices, a proposed approach segments operands and corresponding basic arithmetic operations that can be carried…”
Get full text
Journal Article -
2
Security of Neural Networks from Hardware Perspective: A Survey and Beyond
Published in 2021 26th Asia and South Pacific Design Automation Conference (ASP-DAC) (18-01-2021)“…Recent advances in neural networks (NNs) and their applications in deep learning techniques have made the security aspects of NNs an important and timely topic…”
Get full text
Conference Proceeding -
3
Performance optimization for terahertz quantum cascade laser at higher temperature using genetic algorithm
Published in Optical and quantum electronics (01-12-2012)“…The aim of this work is to establish an approach for obtaining improved design parameters for high temperature operation of terahertz quantum cascade lasers…”
Get full text
Journal Article -
4
Voltage Over-Scaling-Based Lightweight Authentication for IoT Security
Published in IEEE transactions on computers (01-02-2022)“…It is a challenging task to deploy lightweight security protocols in resource-constrained IoT applications. A hardware-oriented lightweight authentication…”
Get full text
Journal Article -
5
Memristors for Secret Sharing-Based Lightweight Authentication
Published in IEEE transactions on very large scale integration (VLSI) systems (01-12-2018)“…User authentication is one of the most fundamental security problems that design effective ways of identifying single or multiple entities using shared…”
Get full text
Journal Article -
6
Ising Model Processors on a Spatial Computing Architecture
Published in 2024 IEEE 67th International Midwest Symposium on Circuits and Systems (MWSCAS) (11-08-2024)“…Data-flow-driven spatial computing architectures are emerging to enable efficient acceleration of complex machine learning models at the edge devices…”
Get full text
Conference Proceeding -
7
An Approximate Memory Based Defense Against Model Inversion Attacks to Neural Networks
Published in IEEE transactions on emerging topics in computing (01-10-2022)“…Diverse and comprehensive training data is critical in building robust machine learning (ML) models. However, model inversion attacks (MIA) have demonstrated…”
Get full text
Journal Article -
8
An RRAM-Based Computing-in-Memory Architecture and Its Application in Accelerating Transformer Inference
Published in IEEE transactions on very large scale integration (VLSI) systems (01-03-2024)“…Deep neural network (DNN)-based transformer models have demonstrated remarkable performance in natural language processing (NLP) applications. Unfortunately,…”
Get full text
Journal Article -
9
ADLPT: Improving 3D NAND Flash Memory Reliability By Adaptive Lifetime Prediction Techniques
Published in IEEE transactions on computers (01-06-2023)“…NAND flash memory has become increasingly popular in various computing systems. Although NAND flash memory offers attractive performance, it suffers limited…”
Get full text
Journal Article -
10
Hardware-based anti-counterfeiting techniques for safeguarding supply chain integrity
Published in 2017 IEEE International Symposium on Circuits and Systems (ISCAS) (01-05-2017)“…Counterfeit integrated circuits (ICs) and systems have emerged as a menace to the supply chain of electronic goods and products. Simple physical inspection for…”
Get full text
Conference Proceeding -
11
Computation-in-Memory Accelerators for Secure Graph Database: Opportunities and Challenges
Published in 2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC) (17-01-2022)“…This work presents the challenges and opportunities for developing computing-in-memory (CIM) accelerators to support secure graph databases (GDB). First, we…”
Get full text
Conference Proceeding -
12
Hardware-Based Authentication for the Internet of Things
Published 01-01-2018“…Entity authentication is one of the most fundamental problems in computer security. Implementation of any authentication protocol requires the solution of…”
Get full text
Dissertation -
13
Attack Detection and Countermeasures for Autonomous Navigation
Published in 2021 55th Annual Conference on Information Sciences and Systems (CISS) (24-03-2021)“…Advances in artificial intelligence, machine learning, and robotics have profoundly impacted the field of autonomous navigation and driving. However, sensor…”
Get full text
Conference Proceeding -
14
RIME: A Scalable and Energy-Efficient Processing-In-Memory Architecture for Floating-Point Operations
Published in 2021 26th Asia and South Pacific Design Automation Conference (ASP-DAC) (18-01-2021)“…Processing in-memory (PIM) is an emerging technology poised to break the memory-wall in the conventional von Neumann architecture. PIM reduces data movement…”
Get full text
Conference Proceeding -
15
VOLtA: Voltage over-scaling based lightweight authentication for IoT applications
Published in 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC) (01-01-2017)“…Incorporating security protocols in IoT components is challenging due to their extremely constrained resources. We address this challenge by proposing a…”
Get full text
Conference Proceeding -
16
Securing Industrial Control Systems Using Physical Device Fingerprinting
Published in 2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS) (14-12-2020)“…The advent of the Internet-of-Things (IoT) has introduced new connectivity modalities, communication protocols, and optimized architectures to coordinate…”
Get full text
Conference Proceeding -
17
MIDAS: Model Inversion Defenses Using an Approximate Memory System
Published in 2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) (15-12-2020)“…Private data constitute a significant share of the training information for machine learning (ML) algorithms. Recent works on model inversion attacks (MIA)…”
Get full text
Conference Proceeding -
18
Cyber Threat Analysis and Trustworthy Artificial Intelligence
Published in 2022 6th International Conference on Cryptography, Security and Privacy (CSP) (01-01-2022)“…Cyber threats can cause severe damage to computing infrastructure and systems as well as data breaches that make sensitive data vulnerable to attackers and…”
Get full text
Conference Proceeding -
19
Poster: Address Resolution Protocol Based Attacks for Multi-Robot Systems
Published in 2024 IEEE International Conference on Mobility, Operations, Services and Technologies (MOST) (01-05-2024)“…Robot Operating System (ROS) is a popular open-source middleware that provides a standard robotic application development framework using…”
Get full text
Conference Proceeding -
20
Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks
Published in 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) (01-12-2018)“…Efficient key management for automotive networks (CAN) is critical, governing the adoption of security in the next generation of vehicles. A recent promising…”
Get full text
Conference Proceeding