Secure and Innovative Computing Research Group

Conference Papers |
|||||||||

1. K. Doan, Y. Lao, P. Yang, and P. Li, "Defending Backdoor Attacks on Vision Transformer via Patch Processing," |
|||||||||

2. K. Doan, Y. Lao, and P. Li, "Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class," |
|||||||||

3. C. Kowalski, A. Famili, and Y. Lao, "Towards Model Quantization On The Resilience Against Membership Inference Attacks," |
|||||||||

4. A. Wang, W. Tan, Y. Lao, and K. K. Parhi, "Integral Sampler and Polynomial Multiplication Architecture for Lattice-based Cryptography," |
|||||||||

5. F. Shezan, Y. Lao, M. Peng, X. Wang, M. Sun, and P. Li, "NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language," |
|||||||||

6. W. Zhao, Y. Lao, and P. Li, "Integrity Authentication in Tree Models," |
|||||||||

7. A. Famili and Y. Lao, "Genetic-based Joint Dynamic Pruning and Learning Algorithm to Boost DNN Performance," |
|||||||||

8. J. Clements and Y. Lao, "In Pursuit of Preserving the Fidelity of Adversarial Images," |
|||||||||

9. F. B. Tarik, D. Joyce, Y. Lao, and J. D. Ryckman, "Electrically Reconfigurable Photonic PUF based on a Moire Quasicrystal Interferometer," |
|||||||||

10. B. Zhao and Y. Lao, "CLPA: Clean-Label Poisoning Availability Attacks Using Generative Adversarial Nets," |
|||||||||

11. J. Clements and Y. Lao, "DeepHardMark: Towards Watermarking Neural Network Hardware," |
|||||||||

12. Y. Lao, W. Zhao, P. Yang, and P. Li, "DeepAuth: A DNN Authentication Framework by Model-Unique and Fragile Signature Embedding," |
|||||||||

13. Y. Lao, P. Yang, W. Zhao, and P. Li, "Identification for Deep Neural Network: Simply Adjusting Few Weights," |
|||||||||

14. B. Zhao and Y. Lao, "Towards Class-Oriented Poisoning Attacks Against Neural Networks," |
|||||||||

15. K. Doan, Y. Lao, and P. Li, "Backdoor Attack with Imperceptible Input and Latent Modification," |
|||||||||

16. W. Tan, A. Wang, Y. Lao, X. Zhang, and K.K. Parhi, "Pipelined High-throughput NTT Architecture for Lattice-based Cryptography," |
|||||||||

17. J. Clements, Y. Yang, A. Sharma, H. Hu, and Y. Lao, "Rallying Adversarial Techniques against Deep Learning for Network Security," |
|||||||||

18. F. B. Tarik, A. Famili, Y. Lao, and J. D. Ryckman, "Secure Authentication of 56 Physically Unclonable Silicon Photonic Integrated Circuits," |
|||||||||

19. P. Yang, Y. Lao, and P. Li, "Robust Watermarking for Deep Neural Networks via Bi-level Optimization," |
|||||||||

20. K. Doan, Y. Lao, W. Zhao, and P. Li, "LIRA: Learnable, Imperceptible and Robust Backdoor Attacks," |
|||||||||

21. F. B. Tarik, A. Famili, Y. Lao, and J. D. Ryckman, "Analysis of 56 Physically Unclonable Silicon Photonic Moire Quasicrystal Interferometers," |
|||||||||

22. X. Wang, Y. Lao, Y. Gu, and B. Fang, "Haptic Glove for Object Recognition and Hand Motion Detection," |
|||||||||

23. W. Tan, A. Wang, Y. Xu, and Y. Lao, "Area-efficient Pipelined VLSI Architecture for Polar Decoder," |
|||||||||

24. J. Sun, N. Sharma, J. Chakareski, N. Mastronarde, and Y Lao, "Action Evaluation Hardware Accelerator for Next-Generation Real-Time Reinforcement Learning in Emerging IoT Systems," |
|||||||||

25. F. B. Tarik, A. Famili, Y. Lao, and J. D. Ryckman, "Realization of Robust Optical Physical Unclonable Function Using a Silicon Photonic Quasicrystal Interferometer," |
|||||||||

26. A. Famili, C. Pathiravasam, Y, Lao, and G. K. Venayagamoorthy, "Device-Specific Signature Generation Technique for Smart Grid Device," |
|||||||||

27. Y. Xu, Y. Lao, W. Liu, and C. Zhang, "Security Analysis and Modeling Attacks on Duty Cycle Multiplexer PUF," |
|||||||||

28. W. Tan, G. Hu, B. Case, S. Gao, and Y. Lao, "An Efficient Polynomial Multiplier Architecture for the Bootstrapping Algorithm in A Fully Homomorphic Encryption Scheme," |
|||||||||

29. L. Qiu, Z. Zhang, J. Calhoun, and Y. Lao, "Towards Data-Driven Approximate Circuit Design," |
|||||||||

30. A. Sharma, X. Zhang, and Y. Lao, "Hardware Obfuscation Through Reconfiguration Finite Field Arithmetic Units," |
|||||||||

31. J. Clements and Y. Lao, "Hardware Trojan Design on Neural Networks," |
|||||||||

32. J. Clements and Y. Lao, "Backdoor Attacks on Neural Network Operations," |
|||||||||

33. B. Zhao and Y. Lao, "Resilience of Pruned Neural Network Against Poisoning Attack," |
|||||||||

34. S. Kai, Y. Shen, Y. Lao, Z. Zhang, X. You and Chuan Zhang, "A New Error Correction Scheme for Physical Unclonable Function," |
|||||||||

35. Y. Wen and Y. Lao, "Efficient PUF Error Correction Through Response Weighting," |
|||||||||

36. X. Wang and Y. Lao, "Utilizing Inherent Randomness in Stochastic Computing," |
|||||||||

37. Y. Wen and Y. Lao, "PUF Modeling Attack using Active Learning," |
|||||||||

38. L. Qiu and Y. Lao, "A Systematic Method for Approximate Circuit Design Using Feature Selection," |
|||||||||

39. Y. Xu, Y. Lao, W. Liu, X. You, and C. Zhang, "DC MUX PUF: A Highly Reliable Feed-Back MUX PUF Based on Measuring Duty Cycle," |
|||||||||

40. Y. Wen and Y. Lao, "Efficient Fuzzy Extractor Implementations for PUF Based Authentication," |
|||||||||

41. Y. Wen and Y. Lao, "Enhancing PUF Reliability by Machine Learning," |
|||||||||

42. Y. Lao and K. K. Parhi, "Data-Canonic Real FFT Flow-Graphs for Composite Lengths," |
|||||||||

43. C. Zhou, S. Satapathy, Y. Lao, K.K. Parhi and C.H. Kim, "Soft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs," |
|||||||||

44. S. V. S. Avvaru, C. Zhou, S. Satapathy, Y. Lao, C. H. Kim and K. K. Parhi, "Estimating Delay Differences of Arbiter PUFs Using Silicon Data," |
|||||||||

45. Y. Lao and K. K. Parhi, "Canonic Real-Valued Radix-2n FFT Computations," |
|||||||||

46. G. C. Shanmugam, Y. Lao, and K. K. Parhi, "An Obfuscated Radix-2 Real FFT Architecture," |
|||||||||

47. M. Parhi, Y. Lao, and K. K. Parhi, "Canonic Real-Valued FFT Structures," |
|||||||||

48. Q. Tang, B. Kim, Y. Lao, K. K. Parhi, and C. H. Kim, "True Random Number Generator Circuits based on Single- and Multi-Phase Beat Frequency Detection," |
|||||||||

49. Y. Lao and K. K. Parhi, "Protecting DSP Circuits Through Obfuscation," |
|||||||||

50. Y. Lao and K. K. Parhi, "Reconfigurable Architectures for Silicon Physical Unclonable Functions," |
|||||||||

51. Y. Lao and K. K. Parhi, "Novel Reconfigurable Silicon Physical Unclonable Functions," |
|||||||||

Journal Publications |
|||||||||

1. F. B. Tarik, A. Famili, Y. Lao, and J. D. Ryckman, "Scalable and CMOS Compatible Silicon Photonic Physical Unclonable Functions for Supply Chain Assurance," |
|||||||||

2. J. Sun, N. Sharma, J. Chakareski, N. Mastronarde, and Y. Lao, "Hardware Acceleration for Post-Decision State Reinforcement Learning in IoT Systems," |
|||||||||

3. A. Wang, W. Tan, Y. Wen, and Y. Lao, "NoPUF: A Novel PUF Design Framework Towards Modeling Attack," |
|||||||||

4. W. Tan, B. Case, A. Wang, S. Gao, and Y. Lao, "High-Speed Modular Multiplier for Lattice-Based Cryptosystems," |
|||||||||

5. W. Tan, B. Case, G. Hu, S. Gao, and Y. Lao, "An Ultra-Highly Parallel Polynomial Multiplier for the Bootstrapping Algorithm in a Fully Homomorphic Encryption Scheme," |
|||||||||

6. F. B. Tarik, A. Famili, Y. Lao, and J. D. Ryckman, "Robust Optical Physical Unclonable Function Using Disordered Photonic Integrated Circuits," |
|||||||||

7. Y. Xu, Y. Lao, W. Liu, Z. Zhang, X. You, and C. Zhang, "Mathematical Modeling Analysis of Strong Physical Unclonable Functions," |
|||||||||

8. X. Zhang and Y. Lao, "On the Construction of Composite Finite Fields for Hardware Obfuscation," |
|||||||||

9. Y. Lao and K. K. Parhi, "Canonic Composite Length Real-Valued FFT," |
|||||||||

10. Y. Lao and K. K. Parhi, "Canonic FFT Flow-Graphs for Real-Valued Even/Odd Symmetric Inputs," |
|||||||||

11. Y. Lao, B. Yuan, C. H. Kim and K. K. Parhi, "Reliable PUF-based Local Authentication with Self-Correction," |
|||||||||

12. Y. Lao, Q. Tang, C. H. Kim, and K. K. Parhi, "Beat Frequency Detector based True Random Number Generator: Statistical Modeling and Analysis," |
|||||||||

13. Y. Lao and K. K. Parhi, "Obfuscating DSP Circuits via High-Level Transformations," |
|||||||||

14. Y. Lao and K. K. Parhi, "Statistical Analysis of MUX-based Physical Unclonable Functions," |
|||||||||

15. M. Ayinala, Y. Lao, and K. K. Parhi, "An In-Place FFT Architecture for Real-Valued Signals," |
|||||||||