Secure and Innovative Computing Research Group

Conference Papers |
|||||||||

1. B. Zhao and Y. Lao, "CLPA: Clean-Label Poisoning Availability Attacks Using Generative Adversarial Nets," |
|||||||||

2. J. Clements and Y. Lao, "DeepHardMark: Towards Watermarking Neural Network Hardware," |
|||||||||

3. Y. Lao, W. Zhao, P. Yang, and P. Li, "DeepAuth: A DNN Authentication Framework by Model-Unique and Fragile Signature Embedding," |
|||||||||

4. Y. Lao, P. Yang, W. Zhao, and P. Li, "Identification for Deep Neural Network: Simply Adjusting Few Weights," |
|||||||||

5. B. Zhao and Y. Lao, "Towards Class-Oriented Poisoning Attacks Against Neural Networks," |
|||||||||

6. K. Doan, Y. Lao, and P. Li, "Backdoor Attack with Imperceptible Input and Latent Modification," |
|||||||||

7. W. Tan, A. Wang, Y. Lao, X. Zhang, and K.K. Parhi, "Pipelined High-throughput NTT Architecture for Lattice-based Cryptography," |
|||||||||

8. J. Clements, Y. Yang, A. Sharma, H. Hu, and Y. Lao, "Rallying Adversarial Techniques against Deep Learning for Network Security," |
|||||||||

9. P. Yang, Y. Lao, and P. Li, "Robust Watermarking for Deep Neural Networks via Bi-level Optimization," |
|||||||||

10. K. Doan, Y. Lao, W. Zhao, and P. Li, "LIRA: Learnable, Imperceptible and Robust Backdoor Attacks," |
|||||||||

11. F. B. Tarik, A. Famili, Y. Lao, and J. D. Ryckman, "Analysis of 56 Physically Unclonable Silicon Photonic Moire Quasicrystal Interferometers," |
|||||||||

12. X. Wang, Y. Lao, Y. Gu, and B. Fang, "Haptic Glove for Object Recognition and Hand Motion Detection," |
|||||||||

13. W. Tan, A. Wang, Y. Xu, and Y. Lao, "Area-efficient Pipelined VLSI Architecture for Polar Decoder," |
|||||||||

14. J. Sun, N. Sharma, J. Chakareski, N. Mastronarde, and Y Lao, "Action Evaluation Hardware Accelerator for Next-Generation Real-Time Reinforcement Learning in Emerging IoT Systems," |
|||||||||

15. A. Famili, C. Pathiravasam, Y, Lao, and G. K. Venayagamoorthy, "Device-Specific Signature Generation Technique for Smart Grid Device," |
|||||||||

16. W. Tan, G. Hu, B. Case, S. Gao, and Y. Lao, "An Efficient Polynomial Multiplier Architecture for the Bootstrapping Algorithm in A Fully Homomorphic Encryption Scheme," |
|||||||||

17. L. Qiu, Z. Zhang, J. Calhoun, and Y. Lao, "Towards Data-Driven Approximate Circuit Design," |
|||||||||

18. A. Sharma, X. Zhang, and Y. Lao, "Hardware Obfuscation Through Reconfiguration Finite Field Arithmetic Units," |
|||||||||

19. J. Clements and Y. Lao, "Hardware Trojan Design on Neural Networks," |
|||||||||

20. J. Clements and Y. Lao, "Backdoor Attacks on Neural Network Operations," |
|||||||||

21. B. Zhao and Y. Lao, "Resilience of Pruned Neural Network Against Poisoning Attack," |
|||||||||

22. S. Kai, Y. Shen, Y. Lao, Z. Zhang, X. You and Chuan Zhang, "A New Error Correction Scheme for Physical Unclonable Function," |
|||||||||

23. Y. Wen and Y. Lao, "Efficient PUF Error Correction Through Response Weighting," |
|||||||||

24. X. Wang and Y. Lao, "Utilizing Inherent Randomness in Stochastic Computing," |
|||||||||

25. Y. Wen and Y. Lao, "PUF Modeling Attack using Active Learning," |
|||||||||

26. L. Qiu and Y. Lao, "A Systematic Method for Approximate Circuit Design Using Feature Selection," |
|||||||||

27. Y. Xu, Y. Lao, W. Liu, X. You, and C. Zhang, "DC MUX PUF: A Highly Reliable Feed-Back MUX PUF Based on Measuring Duty Cycle," |
|||||||||

28. K. Sun, Y. Lao, W. Liu, X. You, and C. Zhang, "Application of LDPC Codes on PUF Error Correction Based on Code-offset Construction," |
|||||||||

29. Y. Wen and Y. Lao, "Efficient Fuzzy Extractor Implementations for PUF Based Authentication," |
|||||||||

30. Y. Wen and Y. Lao, "Enhancing PUF Reliability by Machine Learning," |
|||||||||

31. Y. Lao and K. K. Parhi, "Data-Canonic Real FFT Flow-Graphs for Composite Lengths," |
|||||||||

32. C. Zhou, S. Satapathy, Y. Lao, K.K. Parhi and C.H. Kim, "Soft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs," |
|||||||||

33. S. V. S. Avvaru, C. Zhou, S. Satapathy, Y. Lao, C. H. Kim and K. K. Parhi, "Estimating Delay Differences of Arbiter PUFs Using Silicon Data," |
|||||||||

34. Y. Lao and K. K. Parhi, "Canonic Real-Valued Radix-2n FFT Computations," |
|||||||||

35. G. C. Shanmugam, Y. Lao, and K. K. Parhi, "An Obfuscated Radix-2 Real FFT Architecture," |
|||||||||

36. M. Parhi, Y. Lao, and K. K. Parhi, "Canonic Real-Valued FFT Structures," |
|||||||||

37. Q. Tang, B. Kim, Y. Lao, K. K. Parhi, and C. H. Kim, "True Random Number Generator Circuits based on Single- and Multi-Phase Beat Frequency Detection," |
|||||||||

38. Y. Lao and K. K. Parhi, "Protecting DSP Circuits Through Obfuscation," |
|||||||||

39. Y. Lao and K. K. Parhi, "Reconfigurable Architectures for Silicon Physical Unclonable Functions," |
|||||||||

40. Y. Lao and K. K. Parhi, "Novel Reconfigurable Silicon Physical Unclonable Functions," |
|||||||||

Journal Publications |
|||||||||

1. A. Wang, W. Tan, Y. Wen, and Y. Lao, "NoPUF: A Novel PUF Design Framework Towards Modeling Attack," |
|||||||||

2. W. Tan, B. Case, A. Wang, S. Gao, and Y. Lao, "High-Speed Modular Multiplier for Lattice-Based Cryptosystems," |
|||||||||

3. W. Tan, B. Case, G. Hu, S. Gao, and Y. Lao, "An Ultra-Highly Parallel Polynomial Multiplier for the Bootstrapping Algorithm in a Fully Homomorphic Encryption Scheme," |
|||||||||

4. F. B. Tarik, A. Famili, Y. Lao, and J. D. Ryckman, "Robust Optical Physical Unclonable Function Using Disordered Photonic Integrated Circuits," |
|||||||||

5. Y. Xu, Y. Lao, W. Liu, Z. Zhang, X. You, and C. Zhang, "Mathematical Modeling Analysis of Strong Physical Unclonable Functions," |
|||||||||

6. X. Zhang and Y. Lao, "On the Construction of Composite Finite Fields for Hardware Obfuscation," |
|||||||||

7. Y. Lao and K. K. Parhi, "Canonic Composite Length Real-Valued FFT," |
|||||||||

8. Y. Lao and K. K. Parhi, "Canonic FFT Flow-Graphs for Real-Valued Even/Odd Symmetric Inputs," |
|||||||||

9. Y. Lao, B. Yuan, C. H. Kim and K. K. Parhi, "Reliable PUF-based Local Authentication with Self-Correction," |
|||||||||

10. Y. Lao, Q. Tang, C. H. Kim, and K. K. Parhi, "Beat Frequency Detector based True Random Number Generator: Statistical Modeling and Analysis," |
|||||||||

11. Y. Lao and K. K. Parhi, "Obfuscating DSP Circuits via High-Level Transformations," |
|||||||||

12. Y. Lao and K. K. Parhi, "Statistical Analysis of MUX-based Physical Unclonable Functions," |
|||||||||

13. M. Ayinala, Y. Lao, and K. K. Parhi, "An In-Place FFT Architecture for Real-Valued Signals," |
|||||||||