Search Results - "Karimian, Nima"

Refine Results
  1. 1

    DRAM-Based Intrinsic Physically Unclonable Functions for System-Level Security and Authentication by Tehranipoor, Fatemeh, Karimian, Nima, Wei Yan, Chandy, John A.

    “…A physically unclonable function (PUF) is an irreversible probabilistic function that produces a random bit string. It is simple to implement but hard to…”
    Get full text
    Journal Article
  2. 2

    Hyperglycemia Identification Using ECG in Deep Learning Era by Cordeiro, Renato, Karimian, Nima, Park, Younghee

    Published in Sensors (Basel, Switzerland) (18-09-2021)
    “…A growing number of smart wearable biosensors are operating in the medical IoT environment and those that capture physiological signals have received special…”
    Get full text
    Journal Article
  3. 3

    ECG Biometric Authentication: A Comparative Analysis by Ingale, Mohit, Cordeiro, Renato, Thentu, Siddartha, Park, Younghee, Karimian, Nima

    Published in IEEE access (2020)
    “…Robust authentication and identification methods become an indispensable urgent task to protect the integrity of the devices and the sensitive data. Passwords…”
    Get full text
    Journal Article
  4. 4

    Never Lose Your ECG: A Novel Key Generation and Authentication Scheme for Implantable Medical Devices by Karimian, Nima, Saldamli, Gokay, Park, Younghee, Lui, Victor

    Published in IEEE access (2023)
    “…Implantable medical devices, such as pacemakers, cardiac defibrillators, and insulin pumps, play a crucial role in monitoring patients' vital signs within…”
    Get full text
    Journal Article
  5. 5

    ECG Biometric: Spoofing and Countermeasures by Karimian, Nima, Woodard, Damon, Forte, Domenic

    “…The increased need for access control has motivated a widespread deployment of biometric systems in the last few years. However, recent works indicate that…”
    Get full text
    Journal Article
  6. 6

    Unlock Your Heart: Next Generation Biometric in Resource-Constrained Healthcare Systems and IoT by Karimian, Nima, Tehranipoor, Mark, Woodard, Damon, Forte, Domenic

    Published in IEEE access (2019)
    “…With the emergence of the Internet-of-Things, there is a growing need for access control and data protection on low-power, pervasive devices. Key-based…”
    Get full text
    Journal Article
  7. 7

    Flash-Based Security Primitives: Evolution, Challenges and Future Directions by Gordon, Holden, Edmonds, Jack, Ghandali, Soroor, Yan, Wei, Karimian, Nima, Tehranipoor, Fatemeh

    Published in Cryptography (01-03-2021)
    “…Over the last two decades, hardware security has gained increasing attention in academia and industry. Flash memory has been given a spotlight in recent years,…”
    Get full text
    Journal Article
  8. 8

    Highly Reliable Key Generation From Electrocardiogram (ECG) by Karimian, Nima, Guo, Zimu, Tehranipoor, Mark, Forte, Domenic

    “…Traditional passwords are inadequate as cryptographic keys, as they are easy to forge and are vulnerable to guessing. Human biometrics have been proposed as a…”
    Get full text
    Journal Article
  9. 9

    ECG Biometric Spoofing Using Adversarial Machine Learning by Garg, Amit, Karimian, Nima

    “…As the Covid-19 pandemic becomes a nationwide problem, physical contact is no longer acceptable. Therefore, biometric technology can be used for practicing…”
    Get full text
    Conference Proceeding
  10. 10

    ECG-Based Authentication Using Timing-Aware Domain-Specific Architecture by Cordeiro, Renato, Gajaria, Dhruv, Limaye, Ankur, Adegbija, Tosiron, Karimian, Nima, Tehranipoor, Fatemeh

    “…Electrocardiogram (ECG) biometric authentication (EBA) is a promising approach for human identification, particularly in consumer devices, due to the…”
    Get full text
    Journal Article
  11. 11

    DVFT: A Lightweight Solution for Power-Supply Noise-Based TRNG Using Dynamic Voltage Feedback Tuning System by Tehranipoor, Fatemeh, Wortman, Paul, Karimian, Nima, Yan, Wei, Chandy, John A.

    “…True random number generators (TRNGs) are central to many computing applications, particularly in security domains such as cryptography. In this paper, we…”
    Get full text
    Journal Article
  12. 12

    LISH: A New Random Number Generator using ECG Noises by Lyp, Thomas, Karimian, Nima, Tehranipoor, Fatemeh

    “…In this paper, we propose a novel method, "Lift and Shift" (LISH), where it can generate a unique true random number based on the patient's unique ECG noise…”
    Get full text
    Conference Proceeding
  13. 13

    Human recognition from photoplethysmography (PPG) based on non-fiducial features by Karimian, Nima, Zimu Guo, Tehranipoor, Mark, Forte, Domenic

    “…Photoplethysmography (PPG) signals have unique identity properties for human recognition, and are becoming easier to capture by emerging IoT sensors. Existing…”
    Get full text
    Conference Proceeding
  14. 14

    Low-cost authentication paradigm for consumer electronics within the internet of wearable fitness tracking applications by Tehranipoor, Fatemeh, Karimian, Nima, Wortman, Paul A., Chandy, John A.

    “…Nowadays, the consumer electronic (CE) market has grown to include smart devices for the Internet of Things. With increased adoption of these smart IoT…”
    Get full text
    Conference Proceeding
  15. 15

    ECG biometric using 2D Deep Convolutional Neural Network by Thentu, Siddartha, Cordeiro, Renato, Park, Youngee, Karimian, Nima

    “…We propose a novel multi-scale continuous wavelet transform feature method to accurately obtain micro-texture and multi-scale ECG characteristics and…”
    Get full text
    Conference Proceeding
  16. 16

    Leveraging Timing Side-Channel Information and Machine Learning for IoT Security by Sahu, Kratika, Kshirsagar, Rasika, Vasudeva, Surbhi, Alzahrani, Taghreed, Karimian, Nima

    “…In the recent era, adoption of IoT technology can be seen in nearly every other field. However, with its fast growth rate, the IoT brings several advanced…”
    Get full text
    Conference Proceeding
  17. 17

    BLOcKeR: A Biometric Locking Paradigm for IoT and the Connected Person by Shomaji, Sumaiya, Guo, Zimu, Ganji, Fatemeh, Karimian, Nima, Woodard, Damon, Forte, Domenic

    Published in Journal of hardware and systems security (01-12-2021)
    “…As the internet-of-things (IoT) era begins, there is a significant need for low-cost access control schemes that allow humans to activate and maintain IoT…”
    Get full text
    Journal Article
  18. 18

    Investigation of DRAM PUFs reliability under device accelerated aging effects by Tehranipoor, Fatemeh, Karimian, Nima, Wei Yan, Chandy, John A.

    “…Physical Unclonable Functions are promising candidates for lightweight authentication applications as they are hard to predict and clone. PUFs are dependent on…”
    Get full text
    Conference Proceeding
  19. 19

    A Study of Power Supply Variation as a Source of Random Noise by Tehranipoor, Fatemeh, Karimian, Nima, Yan, Wei, Chandy, John A.

    “…In this paper, we consider the construction of True Random Numbers Generators (TRNGs) using variations in power supplies. We demonstrate that power supply line…”
    Get full text
    Conference Proceeding
  20. 20

    Contactless Fingerprint Biometric Anti-Spoofing: An Unsupervised Deep Learning Approach by Adami, Banafsheh, Karimian, Nima

    Published 07-11-2023
    “…Contactless fingerprint recognition offers a higher level of user comfort and addresses hygiene concerns more effectively. However, it is also more vulnerable…”
    Get full text
    Journal Article