Secure and Innovative Computing Research Group

 

 

 

 

 

 

 

 

 

 

 

         
    Journal Publications    
   

1. A. Wang, W. Tan, Y. Wen, and Y. Lao, "NoPUF: A Novel PUF Design Framework Towards Modeling Attack," IEEE Transactions on Circuits and Systems I, 68(6), pp. 2508-2521, 2021.

   
   

2. W. Tan, B. Case, A. Wang, S. Gao, and Y. Lao, "High-Speed Modular Multiplier for Lattice-Based Cryptosystems," IEEE Transactions on Circuits and Systems II, 68(8), pp. 2927-2931, 2021.

   
   

3. W. Tan, B. Case, G. Hu, S. Gao, and Y. Lao, "An Ultra-Highly Parallel Polynomial Multiplier for the Bootstrapping Algorithm in a Fully Homomorphic Encryption Scheme," Journal of Signal Processing Systems, pp. 1-14, 2020.

   
   

4. F. B. Tarik, A. Famili, Y. Lao, and J. D. Ryckman, "Robust Optical Physical Unclonable Function Using Disordered Photonic Integrated Circuits," Nanophotonics, 9(9), pp. 2817-2828, 2020.

   
   

5. Y. Xu, Y. Lao, W. Liu, Z. Zhang, X. You, and C. Zhang, "Mathematical Modeling Analysis of Strong Physical Unclonable Functions," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 32(12), pp. 4426-4438, 2020.

   
   

6. X. Zhang and Y. Lao, "On the Construction of Composite Finite Fields for Hardware Obfuscation," IEEE Transactions on Computers, 68(9), pp. 1353-1364, 2019.

   
   

7. Y. Lao and K. K. Parhi, "Canonic Composite Length Real-Valued FFT," Journal of VLSI Signal Processing Systems, vol. 90, pp. 1401–1414, 2018.

   
   

8. Y. Lao and K. K. Parhi, "Canonic FFT Flow-Graphs for Real-Valued Even/Odd Symmetric Inputs," EURASIP Journal on Advances in Signal Processing, vol. 2017(1), p. 45, 2017.

   
   

9. Y. Lao, B. Yuan, C. H. Kim and K. K. Parhi, "Reliable PUF-based Local Authentication with Self-Correction," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 36(2), pp. 201-213, February 2017.

   
   

10. Y. Lao, Q. Tang, C. H. Kim, and K. K. Parhi, "Beat Frequency Detector based True Random Number Generator: Statistical Modeling and Analysis," ACM Journal on Emerging Technologies in Computing Systems, 13(1), Article 9, December 2016.

   
   

11. Y. Lao and K. K. Parhi, "Obfuscating DSP Circuits via High-Level Transformations," IEEE Transactions on Very Large Scale Integration Systems, 23(5), pp. 819-830, May 2015. (IEEE CAS Society Very Large Scale Integration Best Paper Award)

   
   

12. Y. Lao and K. K. Parhi, "Statistical Analysis of MUX-based Physical Unclonable Functions," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 33(5), pp. 649-662, May 2014.

   
   

13. M. Ayinala, Y. Lao, and K. K. Parhi, "An In-Place FFT Architecture for Real-Valued Signals," IEEE Transactions on Circuits and Systems II, 60(10), pp. 652-656, October 2013.

   
    Conference Papers    
   

1. B. Zhao and Y. Lao, "Towards Class-Oriented Poisoning Attacks Against Neural Networks," Proc. of Winter Conference on Applications of Computer Vision (WACV), January 2022.

   
   

2. K. Doan, Y. Lao, and P. Li, "Backdoor Attack with Imperceptible Input and Latent Modification," Proc. of Neural Information Processing Systems (NeurIPS), December 2021.

   
   

3. W. Tan, A. Wang, Y. Lao, X. Zhang, and K.K. Parhi, "Pipelined High-throughput NTT Architecture for Lattice-based Cryptography," Proc. of Asian Hardware Oriented Security and Trust Symposium (AsianHOST), December 2021.

   
   

4. J. Clements, Y. Yang, A. Sharma, H. Hu, and Y. Lao, "Rallying Adversarial Techniques against Deep Learning for Network Security," Proc. of IEEE Symposium Series on Computational Intelligence (SSCI), December 2021.

   
   

5. P. Yang, Y. Lao, and P. Li, "Robust Watermarking for Deep Neural Networks via Bi-level Optimization," Proc. of International Conference on Computer Vision (ICCV), October 2021.

   
   

6. P. Yang, Y. Lao, and P. Li, "LIRA: Learnable, Imperceptible and Robust Backdoor Attacks," Proc. of International Conference on Computer Vision (ICCV), October 2021.

   
   

7. F. B. Tarik, A. Famili, Y. Lao, and J. D. Ryckman, "Analysis of 56 Physically Unclonable Silicon Photonic Moire Quasicrystal Interferometers," Proc. of CLEO: Science and Innovations, May 2021.

   
   

8. X. Wang, Y. Lao, Y. Gu, and B. Fang, "Haptic Glove for Object Recognition and Hand Motion Detection," Proc. of 2020 China Automation Congress (CAC), November 2020.

   
   

9. W. Tan, A. Wang, Y. Xu, and Y. Lao, "Area-efficient Pipelined VLSI Architecture for Polar Decoder," Proc. of IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pp. 352-357, July 2020.

   
   

10. J. Sun, N. Sharma, J. Chakareski, N. Mastronarde, and Y Lao, "Action Evaluation Hardware Accelerator for Next-Generation Real-Time Reinforcement Learning in Emerging IoT Systems," Proc. of IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pp. 428-433, July 2020.

   
   

11. A. Famili, C. Pathiravasam, Y, Lao, and G. K. Venayagamoorthy, "Device-Specific Signature Generation Technique for Smart Grid Device," Proc. of IEEE Power Systems Conference (PSC), pp. 1-5, March 2020.

   
   

12. W. Tan, G. Hu, B. Case, S. Gao, and Y. Lao, "An Efficient Polynomial Multiplier Architecture for the Bootstrapping Algorithm in A Fully Homomorphic Encryption Scheme," 2019 IEEE International Workshop on Signal Processing Systems, pp. 85-90, October 2019.

   
   

13. L. Qiu, Z. Zhang, J. Calhoun, and Y. Lao, "Towards Data-Driven Approximate Circuit Design," Proc. of IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pp. 397-402, July 2019.

   
   

14. A. Sharma, X. Zhang, and Y. Lao, "Hardware Obfuscation Through Reconfiguration Finite Field Arithmetic Units," Proc. of 2019 IEEE International Symposium on Circuits and Systems (ISCAS), May 2019.

   
   

15. J. Clements and Y. Lao, "Hardware Trojan Design on Neural Networks," Proc. of 2019 IEEE International Symposium on Circuits and Systems (ISCAS), May 2019.

   
   

16. J. Clements and Y. Lao, "Backdoor Attacks on Neural Network Operations," Proc. of 2018 6th IEEE Global Conference on Signal and Information Processing, pp. 1154-1158, November 2018.

   
   

17. B. Zhao and Y. Lao, "Resilience of Pruned Neural Network Against Poisoning Attack," Proc. of 2018 IEEE International Conference on Malicious and Unwanted Software, pp. 78-83, October 2018.

   
   

18. S. Kai, Y. Shen, Y. Lao, Z. Zhang, X. You and Chuan Zhang, "A New Error Correction Scheme for Physical Unclonable Function," Proc. of 2018 IEEE Asia Pacific Conference on Circuits and Systems, pp. 374-377, October 2018.

   
   

19. Y. Wen and Y. Lao, "Efficient PUF Error Correction Through Response Weighting," Proc. of 2018 IEEE International Midwest Symposium on Circuits and Systems, August 2018.

   
   

20. X. Wang and Y. Lao, "Utilizing Inherent Randomness in Stochastic Computing," Proc. of 2018 IEEE International Midwest Symposium on Circuits and Systems, August 2018.

   
   

21. Y. Wen and Y. Lao, "PUF Modeling Attack using Active Learning," Proc. of 2018 IEEE International Symposium on Circuits and Systems (ISCAS), May 2018.

   
   

22. L. Qiu and Y. Lao, "A Systematic Method for Approximate Circuit Design Using Feature Selection," Proc. of 2018 IEEE International Symposium on Circuits and Systems (ISCAS), May 2018.

   
   

23. Y. Xu, Y. Lao, W. Liu, X. You, and C. Zhang, "DC MUX PUF: A Highly Reliable Feed-Back MUX PUF Based on Measuring Duty Cycle," Proc. of 11th International collaboration Symposium on Information, Production and Systems, pp. 883-886, November 2017.

   
   

24. K. Sun, Y. Lao, W. Liu, X. You, and C. Zhang, "Application of LDPC Codes on PUF Error Correction Based on Code-offset Construction," Proc. of 11th International collaboration Symposium on Information, Production and Systems, pp. 867-870, November 2017.

   
   

25. Y. Wen and Y. Lao, "Efficient Fuzzy Extractor Implementations for PUF Based Authentication," Proc. of  2017 IEEE International Conference on Malicious and Unwanted Software, pp. 119-125, October 2017.

   
   

26. Y. Wen and Y. Lao, "Enhancing PUF Reliability by Machine Learning," Proc. of IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1-4, May 2017.

   
   

27. Y. Lao and K. K. Parhi, "Data-Canonic Real FFT Flow-Graphs for Composite Lengths," Proc. of  2016 IEEE International Workshop on Signal Processing Systems, pp. 189-194, October 2016.

   
   

28. C. Zhou, S. Satapathy, Y. Lao, K.K. Parhi and C.H. Kim, "Soft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs," Proc. 2016 International Symposium on Low Power Electronics and Design (ISLPED), pp. 124-129, Aug. 2016. (Best Paper Award)

   
   

29. S. V. S. Avvaru, C. Zhou, S. Satapathy, Y. Lao, C. H. Kim and K. K. Parhi, "Estimating Delay Differences of Arbiter PUFs Using Silicon Data," Proc. of 2016 Design, Automation and Test in Europe (DATE), March 2016.

   
   

30. Y. Lao and K. K. Parhi, "Canonic Real-Valued Radix-2n FFT Computations," Proc. of 2015 Asilomar Conference on Signals, Systems and Computers, November 2015.

   
   

31. G. C. Shanmugam, Y. Lao, and K. K. Parhi, "An Obfuscated Radix-2 Real FFT Architecture," Proc. of 40th IEEE International Conference on Acoustics, Speech and Signal Processing, April 2015.

   
   

32. M. Parhi, Y. Lao, and K. K. Parhi, "Canonic Real-Valued FFT Structures," Proc. of Asilomar Conference on Signals, Systems and Computers, November 2014.

   
   

33. Q. Tang, B. Kim, Y. Lao, K. K. Parhi, and C. H. Kim, "True Random Number Generator Circuits based on Single- and Multi-Phase Beat Frequency Detection," Proc. of IEEE Customs Integrated Circuits Conference, pp. 1-4, September 2014.

   
   

34. Y. Lao and K. K. Parhi, "Protecting DSP Circuits Through Obfuscation," Proc. of IEEE International Symposium on Circuits and Systems, pp. 798-801, June 2014.

   
   

35. Y. Lao and K. K. Parhi, "Reconfigurable Architectures for Silicon Physical Unclonable Functions," Proc. of IEEE International Conference on Electro Information Technology, pp. 1-7, May 2011.

   
   

36. Y. Lao and K. K. Parhi, "Novel Reconfigurable Silicon Physical Unclonable Functions," Proc. of Workshop on Foundations of Dependable and Secure Cyber-Physical Systems, pp. 30-36, April 2011.