Search Results - "Karimian, Nima"
-
1
DRAM-Based Intrinsic Physically Unclonable Functions for System-Level Security and Authentication
Published in IEEE transactions on very large scale integration (VLSI) systems (01-03-2017)“…A physically unclonable function (PUF) is an irreversible probabilistic function that produces a random bit string. It is simple to implement but hard to…”
Get full text
Journal Article -
2
Hyperglycemia Identification Using ECG in Deep Learning Era
Published in Sensors (Basel, Switzerland) (18-09-2021)“…A growing number of smart wearable biosensors are operating in the medical IoT environment and those that capture physiological signals have received special…”
Get full text
Journal Article -
3
ECG Biometric Authentication: A Comparative Analysis
Published in IEEE access (2020)“…Robust authentication and identification methods become an indispensable urgent task to protect the integrity of the devices and the sensitive data. Passwords…”
Get full text
Journal Article -
4
Never Lose Your ECG: A Novel Key Generation and Authentication Scheme for Implantable Medical Devices
Published in IEEE access (2023)“…Implantable medical devices, such as pacemakers, cardiac defibrillators, and insulin pumps, play a crucial role in monitoring patients' vital signs within…”
Get full text
Journal Article -
5
ECG Biometric: Spoofing and Countermeasures
Published in IEEE transactions on biometrics, behavior, and identity science (01-07-2020)“…The increased need for access control has motivated a widespread deployment of biometric systems in the last few years. However, recent works indicate that…”
Get full text
Journal Article -
6
Unlock Your Heart: Next Generation Biometric in Resource-Constrained Healthcare Systems and IoT
Published in IEEE access (2019)“…With the emergence of the Internet-of-Things, there is a growing need for access control and data protection on low-power, pervasive devices. Key-based…”
Get full text
Journal Article -
7
Flash-Based Security Primitives: Evolution, Challenges and Future Directions
Published in Cryptography (01-03-2021)“…Over the last two decades, hardware security has gained increasing attention in academia and industry. Flash memory has been given a spotlight in recent years,…”
Get full text
Journal Article -
8
Highly Reliable Key Generation From Electrocardiogram (ECG)
Published in IEEE transactions on biomedical engineering (01-06-2017)“…Traditional passwords are inadequate as cryptographic keys, as they are easy to forge and are vulnerable to guessing. Human biometrics have been proposed as a…”
Get full text
Journal Article -
9
ECG Biometric Spoofing Using Adversarial Machine Learning
Published in 2021 IEEE International Conference on Consumer Electronics (ICCE) (10-01-2021)“…As the Covid-19 pandemic becomes a nationwide problem, physical contact is no longer acceptable. Therefore, biometric technology can be used for practicing…”
Get full text
Conference Proceeding -
10
ECG-Based Authentication Using Timing-Aware Domain-Specific Architecture
Published in IEEE transactions on computer-aided design of integrated circuits and systems (01-11-2020)“…Electrocardiogram (ECG) biometric authentication (EBA) is a promising approach for human identification, particularly in consumer devices, due to the…”
Get full text
Journal Article -
11
DVFT: A Lightweight Solution for Power-Supply Noise-Based TRNG Using Dynamic Voltage Feedback Tuning System
Published in IEEE transactions on very large scale integration (VLSI) systems (01-06-2018)“…True random number generators (TRNGs) are central to many computing applications, particularly in security domains such as cryptography. In this paper, we…”
Get full text
Journal Article -
12
LISH: A New Random Number Generator using ECG Noises
Published in 2021 IEEE International Conference on Consumer Electronics (ICCE) (10-01-2021)“…In this paper, we propose a novel method, "Lift and Shift" (LISH), where it can generate a unique true random number based on the patient's unique ECG noise…”
Get full text
Conference Proceeding -
13
Human recognition from photoplethysmography (PPG) based on non-fiducial features
Published in 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (01-03-2017)“…Photoplethysmography (PPG) signals have unique identity properties for human recognition, and are becoming easier to capture by emerging IoT sensors. Existing…”
Get full text
Conference Proceeding -
14
Low-cost authentication paradigm for consumer electronics within the internet of wearable fitness tracking applications
Published in 2018 IEEE International Conference on Consumer Electronics (ICCE) (01-01-2018)“…Nowadays, the consumer electronic (CE) market has grown to include smart devices for the Internet of Things. With increased adoption of these smart IoT…”
Get full text
Conference Proceeding -
15
ECG biometric using 2D Deep Convolutional Neural Network
Published in 2021 IEEE International Conference on Consumer Electronics (ICCE) (10-01-2021)“…We propose a novel multi-scale continuous wavelet transform feature method to accurately obtain micro-texture and multi-scale ECG characteristics and…”
Get full text
Conference Proceeding -
16
Leveraging Timing Side-Channel Information and Machine Learning for IoT Security
Published in 2021 IEEE International Conference on Consumer Electronics (ICCE) (10-01-2021)“…In the recent era, adoption of IoT technology can be seen in nearly every other field. However, with its fast growth rate, the IoT brings several advanced…”
Get full text
Conference Proceeding -
17
BLOcKeR: A Biometric Locking Paradigm for IoT and the Connected Person
Published in Journal of hardware and systems security (01-12-2021)“…As the internet-of-things (IoT) era begins, there is a significant need for low-cost access control schemes that allow humans to activate and maintain IoT…”
Get full text
Journal Article -
18
Investigation of DRAM PUFs reliability under device accelerated aging effects
Published in 2017 IEEE International Symposium on Circuits and Systems (ISCAS) (01-05-2017)“…Physical Unclonable Functions are promising candidates for lightweight authentication applications as they are hard to predict and clone. PUFs are dependent on…”
Get full text
Conference Proceeding -
19
A Study of Power Supply Variation as a Source of Random Noise
Published in 2017 30th International Conference on VLSI Design and 2017 16th International Conference on Embedded Systems (VLSID) (01-01-2017)“…In this paper, we consider the construction of True Random Numbers Generators (TRNGs) using variations in power supplies. We demonstrate that power supply line…”
Get full text
Conference Proceeding -
20
Contactless Fingerprint Biometric Anti-Spoofing: An Unsupervised Deep Learning Approach
Published 07-11-2023“…Contactless fingerprint recognition offers a higher level of user comfort and addresses hygiene concerns more effectively. However, it is also more vulnerable…”
Get full text
Journal Article