Secure and Innovative Computing Research Group

 

 

 

 

 

 

 

 

 

 

 

         
    Conference Papers    
   

1. K. Doan, Y. Lao, P. Yang, and P. Li, "Defending Backdoor Attacks on Vision Transformer via Patch Processing," Proc. of Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI-23), February 2023.

   
   

2. K. Doan, Y. Lao, and P. Li, "Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class," Proc. of Neural Information Processing Systems (NeurIPS), November 2022.

   
   

3. C. Kowalski, A. Famili, and Y. Lao, "Towards Model Quantization On The Resilience Against Membership Inference Attacks," Proc. of 29th IEEE International Conference on Image Processing (ICIP), October 2022.

   
   

4. A. Wang, W. Tan, Y. Lao, and K. K. Parhi, "Integral Sampler and Polynomial Multiplication Architecture for Lattice-based Cryptography," Proc. of 35th IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, October 2022.

   
   

5. F. Shezan, Y. Lao, M. Peng, X. Wang, M. Sun, and P. Li, "NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language," Proc. of IEEE Conference on Communications and Network Security (CNS), October 2022.

   
   

6. W. Zhao, Y. Lao, and P. Li, "Integrity Authentication in Tree Models," Proc. of 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), pp. 2585–2593, August 2022.

   
   

7. A. Famili and Y. Lao, "Genetic-based Joint Dynamic Pruning and Learning Algorithm to Boost DNN Performance," Proc. of 26th International Conference on Pattern Recognition (ICPR), August 2022.

   
   

8. J. Clements and Y. Lao, "In Pursuit of Preserving the Fidelity of Adversarial Images," Proc. of International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 2859-2863, May 2022.

   
   

9. F. B. Tarik, D. Joyce, Y. Lao, and J. D. Ryckman, "Electrically Reconfigurable Photonic PUF based on a Moire Quasicrystal Interferometer," roc. of CLEO: Science and Innovations, pp. JW3A.30, May 2022.

   
   

10. B. Zhao and Y. Lao, "CLPA: Clean-Label Poisoning Availability Attacks Using Generative Adversarial Nets," Proc. of Thirty-Sixth AAAI Conference on Artificial Intelligence (AAAI-22), February 2022.

   
   

11. J. Clements and Y. Lao, "DeepHardMark: Towards Watermarking Neural Network Hardware," Proc. of Thirty-Sixth AAAI Conference on Artificial Intelligence (AAAI-22), February 2022.

   
   

12. Y. Lao, W. Zhao, P. Yang, and P. Li, "DeepAuth: A DNN Authentication Framework by Model-Unique and Fragile Signature Embedding," Proc. of Thirty-Sixth AAAI Conference on Artificial Intelligence (AAAI-22), February 2022.

   
   

13. Y. Lao, P. Yang, W. Zhao, and P. Li, "Identification for Deep Neural Network: Simply Adjusting Few Weights," Proc. of IEEE International Conference on Data Engineering (ICDE), pp. 1328-1341, May 2022.

   
   

14. B. Zhao and Y. Lao, "Towards Class-Oriented Poisoning Attacks Against Neural Networks," Proc. of Winter Conference on Applications of Computer Vision (WACV), January 2022.

   
   

15. K. Doan, Y. Lao, and P. Li, "Backdoor Attack with Imperceptible Input and Latent Modification," Proc. of Neural Information Processing Systems (NeurIPS), December 2021.

   
   

16. W. Tan, A. Wang, Y. Lao, X. Zhang, and K.K. Parhi, "Pipelined High-throughput NTT Architecture for Lattice-based Cryptography," Proc. of Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pp. 1-4, December 2021.

   
   

17. J. Clements, Y. Yang, A. Sharma, H. Hu, and Y. Lao, "Rallying Adversarial Techniques against Deep Learning for Network Security," Proc. of IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1-8, December 2021.

   
   

18. F. B. Tarik, A. Famili, Y. Lao, and J. D. Ryckman, "Secure Authentication of 56 Physically Unclonable Silicon Photonic Integrated Circuits," Proc. of 2021 IEEE Group IV Photonics Conference (GFP), pp. 1-2, December 2021.

   
   

19. P. Yang, Y. Lao, and P. Li, "Robust Watermarking for Deep Neural Networks via Bi-level Optimization," Proc. of International Conference on Computer Vision (ICCV), pp. 14841-14850, October 2021.

   
   

20. K. Doan, Y. Lao, W. Zhao, and P. Li, "LIRA: Learnable, Imperceptible and Robust Backdoor Attacks," Proc. of International Conference on Computer Vision (ICCV), pp. 11966-11976, October 2021.

   
   

21. F. B. Tarik, A. Famili, Y. Lao, and J. D. Ryckman, "Analysis of 56 Physically Unclonable Silicon Photonic Moire Quasicrystal Interferometers," Proc. of CLEO: Science and Innovations, pp. FTu2M.7, May 2021.

   
   

22. X. Wang, Y. Lao, Y. Gu, and B. Fang, "Haptic Glove for Object Recognition and Hand Motion Detection," Proc. of 2020 China Automation Congress (CAC), pp. 7192-7196, November 2020.

   
   

23. W. Tan, A. Wang, Y. Xu, and Y. Lao, "Area-efficient Pipelined VLSI Architecture for Polar Decoder," Proc. of IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pp. 352-357, July 2020.

   
   

24. J. Sun, N. Sharma, J. Chakareski, N. Mastronarde, and Y Lao, "Action Evaluation Hardware Accelerator for Next-Generation Real-Time Reinforcement Learning in Emerging IoT Systems," Proc. of IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pp. 428-433, July 2020.

   
   

25. F. B. Tarik, A. Famili, Y. Lao, and J. D. Ryckman, "Realization of Robust Optical Physical Unclonable Function Using a Silicon Photonic Quasicrystal Interferometer," Proc. of CLEO: Science and Innovations, pp. SF3J-2, May 2020.

   
   

26. A. Famili, C. Pathiravasam, Y, Lao, and G. K. Venayagamoorthy, "Device-Specific Signature Generation Technique for Smart Grid Device," Proc. of IEEE Power Systems Conference (PSC), pp. 1-5, March 2020.

   
   

27. Y. Xu, Y. Lao, W. Liu, and C. Zhang, "Security Analysis and Modeling Attacks on Duty Cycle Multiplexer PUF," Proc. of 2019 IEEE 13th International Conference on ASIC (ASICON), pp. 1-4, November 2019.

   
   

28. W. Tan, G. Hu, B. Case, S. Gao, and Y. Lao, "An Efficient Polynomial Multiplier Architecture for the Bootstrapping Algorithm in A Fully Homomorphic Encryption Scheme," Proc. of 2019 IEEE International Workshop on Signal Processing Systems, pp. 85-90, October 2019.

   
   

29. L. Qiu, Z. Zhang, J. Calhoun, and Y. Lao, "Towards Data-Driven Approximate Circuit Design," Proc. of IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pp. 397-402, July 2019.

   
   

30. A. Sharma, X. Zhang, and Y. Lao, "Hardware Obfuscation Through Reconfiguration Finite Field Arithmetic Units," Proc. of 2019 IEEE International Symposium on Circuits and Systems (ISCAS), May 2019.

   
   

31. J. Clements and Y. Lao, "Hardware Trojan Design on Neural Networks," Proc. of 2019 IEEE International Symposium on Circuits and Systems (ISCAS), May 2019.

   
   

32. J. Clements and Y. Lao, "Backdoor Attacks on Neural Network Operations," Proc. of 2018 6th IEEE Global Conference on Signal and Information Processing, pp. 1154-1158, November 2018.

   
   

33. B. Zhao and Y. Lao, "Resilience of Pruned Neural Network Against Poisoning Attack," Proc. of 2018 IEEE International Conference on Malicious and Unwanted Software, pp. 78-83, October 2018.

   
   

34. S. Kai, Y. Shen, Y. Lao, Z. Zhang, X. You and Chuan Zhang, "A New Error Correction Scheme for Physical Unclonable Function," Proc. of 2018 IEEE Asia Pacific Conference on Circuits and Systems, pp. 374-377, October 2018.

   
   

35. Y. Wen and Y. Lao, "Efficient PUF Error Correction Through Response Weighting," Proc. of 2018 IEEE International Midwest Symposium on Circuits and Systems, August 2018.

   
   

36. X. Wang and Y. Lao, "Utilizing Inherent Randomness in Stochastic Computing," Proc. of 2018 IEEE International Midwest Symposium on Circuits and Systems, August 2018.

   
   

37. Y. Wen and Y. Lao, "PUF Modeling Attack using Active Learning," Proc. of 2018 IEEE International Symposium on Circuits and Systems (ISCAS), May 2018.

   
   

38. L. Qiu and Y. Lao, "A Systematic Method for Approximate Circuit Design Using Feature Selection," Proc. of 2018 IEEE International Symposium on Circuits and Systems (ISCAS), May 2018.

   
   

39. Y. Xu, Y. Lao, W. Liu, X. You, and C. Zhang, "DC MUX PUF: A Highly Reliable Feed-Back MUX PUF Based on Measuring Duty Cycle," Proc. of 11th International collaboration Symposium on Information, Production and Systems, pp. 883-886, November 2017.

   
   

40. Y. Wen and Y. Lao, "Efficient Fuzzy Extractor Implementations for PUF Based Authentication," Proc. of  2017 IEEE International Conference on Malicious and Unwanted Software, pp. 119-125, October 2017.

   
   

41. Y. Wen and Y. Lao, "Enhancing PUF Reliability by Machine Learning," Proc. of IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1-4, May 2017.

   
   

42. Y. Lao and K. K. Parhi, "Data-Canonic Real FFT Flow-Graphs for Composite Lengths," Proc. of  2016 IEEE International Workshop on Signal Processing Systems, pp. 189-194, October 2016.

   
   

43. C. Zhou, S. Satapathy, Y. Lao, K.K. Parhi and C.H. Kim, "Soft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs," Proc. 2016 International Symposium on Low Power Electronics and Design (ISLPED), pp. 124-129, Aug. 2016. (Best Paper Award)

   
   

44. S. V. S. Avvaru, C. Zhou, S. Satapathy, Y. Lao, C. H. Kim and K. K. Parhi, "Estimating Delay Differences of Arbiter PUFs Using Silicon Data," Proc. of 2016 Design, Automation and Test in Europe (DATE), March 2016.

   
   

45. Y. Lao and K. K. Parhi, "Canonic Real-Valued Radix-2n FFT Computations," Proc. of 2015 Asilomar Conference on Signals, Systems and Computers, November 2015.

   
   

46. G. C. Shanmugam, Y. Lao, and K. K. Parhi, "An Obfuscated Radix-2 Real FFT Architecture," Proc. of 40th IEEE International Conference on Acoustics, Speech and Signal Processing, April 2015.

   
   

47. M. Parhi, Y. Lao, and K. K. Parhi, "Canonic Real-Valued FFT Structures," Proc. of Asilomar Conference on Signals, Systems and Computers, November 2014.

   
   

48. Q. Tang, B. Kim, Y. Lao, K. K. Parhi, and C. H. Kim, "True Random Number Generator Circuits based on Single- and Multi-Phase Beat Frequency Detection," Proc. of IEEE Customs Integrated Circuits Conference, pp. 1-4, September 2014.

   
   

49. Y. Lao and K. K. Parhi, "Protecting DSP Circuits Through Obfuscation," Proc. of IEEE International Symposium on Circuits and Systems, pp. 798-801, June 2014.

   
   

50. Y. Lao and K. K. Parhi, "Reconfigurable Architectures for Silicon Physical Unclonable Functions," Proc. of IEEE International Conference on Electro Information Technology, pp. 1-7, May 2011.

   
   

51. Y. Lao and K. K. Parhi, "Novel Reconfigurable Silicon Physical Unclonable Functions," Proc. of Workshop on Foundations of Dependable and Secure Cyber-Physical Systems, pp. 30-36, April 2011.

   
    Journal Publications    
   

1. F. B. Tarik, A. Famili, Y. Lao, and J. D. Ryckman, "Scalable and CMOS Compatible Silicon Photonic Physical Unclonable Functions for Supply Chain Assurance," Nanophotonics, 12(1), pp. 1-8, 2022.

   
   

2. J. Sun, N. Sharma, J. Chakareski, N. Mastronarde, and Y. Lao, "Hardware Acceleration for Post-Decision State Reinforcement Learning in IoT Systems," IEEE Internet of Things Journal, 9(12), pp. 9889-9903, 2022.

   
   

3. A. Wang, W. Tan, Y. Wen, and Y. Lao, "NoPUF: A Novel PUF Design Framework Towards Modeling Attack," IEEE Transactions on Circuits and Systems I, 68(6), pp. 2508-2521, 2021.

   
   

4. W. Tan, B. Case, A. Wang, S. Gao, and Y. Lao, "High-Speed Modular Multiplier for Lattice-Based Cryptosystems," IEEE Transactions on Circuits and Systems II, 68(8), pp. 2927-2931, 2021.

   
   

5. W. Tan, B. Case, G. Hu, S. Gao, and Y. Lao, "An Ultra-Highly Parallel Polynomial Multiplier for the Bootstrapping Algorithm in a Fully Homomorphic Encryption Scheme," Journal of Signal Processing Systems, pp. 1-14, 2020.

   
   

6. F. B. Tarik, A. Famili, Y. Lao, and J. D. Ryckman, "Robust Optical Physical Unclonable Function Using Disordered Photonic Integrated Circuits," Nanophotonics, 9(9), pp. 2817-2828, 2020.

   
   

7. Y. Xu, Y. Lao, W. Liu, Z. Zhang, X. You, and C. Zhang, "Mathematical Modeling Analysis of Strong Physical Unclonable Functions," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 32(12), pp. 4426-4438, 2020.

   
   

8. X. Zhang and Y. Lao, "On the Construction of Composite Finite Fields for Hardware Obfuscation," IEEE Transactions on Computers, 68(9), pp. 1353-1364, 2019.

   
   

9. Y. Lao and K. K. Parhi, "Canonic Composite Length Real-Valued FFT," Journal of VLSI Signal Processing Systems, vol. 90, pp. 1401–1414, 2018.

   
   

10. Y. Lao and K. K. Parhi, "Canonic FFT Flow-Graphs for Real-Valued Even/Odd Symmetric Inputs," EURASIP Journal on Advances in Signal Processing, vol. 2017(1), p. 45, 2017.

   
   

11. Y. Lao, B. Yuan, C. H. Kim and K. K. Parhi, "Reliable PUF-based Local Authentication with Self-Correction," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 36(2), pp. 201-213, 2017.

   
   

12. Y. Lao, Q. Tang, C. H. Kim, and K. K. Parhi, "Beat Frequency Detector based True Random Number Generator: Statistical Modeling and Analysis," ACM Journal on Emerging Technologies in Computing Systems, 13(1), Article 9, 2016.

   
   

13. Y. Lao and K. K. Parhi, "Obfuscating DSP Circuits via High-Level Transformations," IEEE Transactions on Very Large Scale Integration Systems, 23(5), pp. 819-830, 2015. (IEEE CAS Society Very Large Scale Integration Best Paper Award)

   
   

14. Y. Lao and K. K. Parhi, "Statistical Analysis of MUX-based Physical Unclonable Functions," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 33(5), pp. 649-662, 2014.

   
   

15. M. Ayinala, Y. Lao, and K. K. Parhi, "An In-Place FFT Architecture for Real-Valued Signals," IEEE Transactions on Circuits and Systems II, 60(10), pp. 652-656, 2013.