![]() |
|||||||||
![]() |
|||||||||
1. K. Doan, Y. Lao, P. Yang, and P. Li, "Defending Backdoor Attacks on Vision Transformer via Patch Processing," Proc. of Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI-23), February 2023. |
|||||||||
2. K. Doan, Y. Lao, and P. Li, "Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class," Proc. of Neural Information Processing Systems (NeurIPS), November 2022. |
|||||||||
3. C. Kowalski, A. Famili, and Y. Lao, "Towards Model Quantization On The Resilience Against Membership Inference Attacks," Proc. of 29th IEEE International Conference on Image Processing (ICIP), October 2022. |
|||||||||
4. A. Wang, W. Tan, Y. Lao, and K. K. Parhi, "Integral Sampler and Polynomial Multiplication Architecture for Lattice-based Cryptography," Proc. of 35th IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, October 2022. |
|||||||||
5. F. Shezan, Y. Lao, M. Peng, X. Wang, M. Sun, and P. Li, "NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language," Proc. of IEEE Conference on Communications and Network Security (CNS), October 2022. |
|||||||||
6. W. Zhao, Y. Lao, and P. Li, "Integrity Authentication in Tree Models," Proc. of 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), pp. 2585–2593, August 2022. |
|||||||||
7. A. Famili and Y. Lao, "Genetic-based Joint Dynamic Pruning and Learning Algorithm to Boost DNN Performance," Proc. of 26th International Conference on Pattern Recognition (ICPR), August 2022. |
|||||||||
8. J. Clements and Y. Lao, "In Pursuit of Preserving the Fidelity of Adversarial Images," Proc. of International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 2859-2863, May 2022. |
|||||||||
9. F. B. Tarik, D. Joyce, Y. Lao, and J. D. Ryckman, "Electrically Reconfigurable Photonic PUF based on a Moire Quasicrystal Interferometer," roc. of CLEO: Science and Innovations, pp. JW3A.30, May 2022. |
|||||||||
10. B. Zhao and Y. Lao, "CLPA: Clean-Label Poisoning Availability Attacks Using Generative Adversarial Nets," Proc. of Thirty-Sixth AAAI Conference on Artificial Intelligence (AAAI-22), February 2022. |
|||||||||
11. J. Clements and Y. Lao, "DeepHardMark: Towards Watermarking Neural Network Hardware," Proc. of Thirty-Sixth AAAI Conference on Artificial Intelligence (AAAI-22), February 2022. |
|||||||||
12. Y. Lao, W. Zhao, P. Yang, and P. Li, "DeepAuth: A DNN Authentication Framework by Model-Unique and Fragile Signature Embedding," Proc. of Thirty-Sixth AAAI Conference on Artificial Intelligence (AAAI-22), February 2022. |
|||||||||
13. Y. Lao, P. Yang, W. Zhao, and P. Li, "Identification for Deep Neural Network: Simply Adjusting Few Weights," Proc. of IEEE International Conference on Data Engineering (ICDE), pp. 1328-1341, May 2022. |
|||||||||
14. B. Zhao and Y. Lao, "Towards Class-Oriented Poisoning Attacks Against Neural Networks," Proc. of Winter Conference on Applications of Computer Vision (WACV), January 2022. |
|||||||||
15. K. Doan, Y. Lao, and P. Li, "Backdoor Attack with Imperceptible Input and Latent Modification," Proc. of Neural Information Processing Systems (NeurIPS), December 2021. |
|||||||||
16. W. Tan, A. Wang, Y. Lao, X. Zhang, and K.K. Parhi, "Pipelined High-throughput NTT Architecture for Lattice-based Cryptography," Proc. of Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pp. 1-4, December 2021. |
|||||||||
17. J. Clements, Y. Yang, A. Sharma, H. Hu, and Y. Lao, "Rallying Adversarial Techniques against Deep Learning for Network Security," Proc. of IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1-8, December 2021. |
|||||||||
18. F. B. Tarik, A. Famili, Y. Lao, and J. D. Ryckman, "Secure Authentication of 56 Physically Unclonable Silicon Photonic Integrated Circuits," Proc. of 2021 IEEE Group IV Photonics Conference (GFP), pp. 1-2, December 2021. |
|||||||||
19. P. Yang, Y. Lao, and P. Li, "Robust Watermarking for Deep Neural Networks via Bi-level Optimization," Proc. of International Conference on Computer Vision (ICCV), pp. 14841-14850, October 2021. |
|||||||||
20. K. Doan, Y. Lao, W. Zhao, and P. Li, "LIRA: Learnable, Imperceptible and Robust Backdoor Attacks," Proc. of International Conference on Computer Vision (ICCV), pp. 11966-11976, October 2021. |
|||||||||
21. F. B. Tarik, A. Famili, Y. Lao, and J. D. Ryckman, "Analysis of 56 Physically Unclonable Silicon Photonic Moire Quasicrystal Interferometers," Proc. of CLEO: Science and Innovations, pp. FTu2M.7, May 2021. |
|||||||||
22. X. Wang, Y. Lao, Y. Gu, and B. Fang, "Haptic Glove for Object Recognition and Hand Motion Detection," Proc. of 2020 China Automation Congress (CAC), pp. 7192-7196, November 2020. |
|||||||||
23. W. Tan, A. Wang, Y. Xu, and Y. Lao, "Area-efficient Pipelined VLSI Architecture for Polar Decoder," Proc. of IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pp. 352-357, July 2020. |
|||||||||
24. J. Sun, N. Sharma, J. Chakareski, N. Mastronarde, and Y Lao, "Action Evaluation Hardware Accelerator for Next-Generation Real-Time Reinforcement Learning in Emerging IoT Systems," Proc. of IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pp. 428-433, July 2020. |
|||||||||
25. F. B. Tarik, A. Famili, Y. Lao, and J. D. Ryckman, "Realization of Robust Optical Physical Unclonable Function Using a Silicon Photonic Quasicrystal Interferometer," Proc. of CLEO: Science and Innovations, pp. SF3J-2, May 2020. |
|||||||||
26. A. Famili, C. Pathiravasam, Y, Lao, and G. K. Venayagamoorthy, "Device-Specific Signature Generation Technique for Smart Grid Device," Proc. of IEEE Power Systems Conference (PSC), pp. 1-5, March 2020. |
|||||||||
27. Y. Xu, Y. Lao, W. Liu, and C. Zhang, "Security Analysis and Modeling Attacks on Duty Cycle Multiplexer PUF," Proc. of 2019 IEEE 13th International Conference on ASIC (ASICON), pp. 1-4, November 2019. |
|||||||||
28. W. Tan, G. Hu, B. Case, S. Gao, and Y. Lao, "An Efficient Polynomial Multiplier Architecture for the Bootstrapping Algorithm in A Fully Homomorphic Encryption Scheme," Proc. of 2019 IEEE International Workshop on Signal Processing Systems, pp. 85-90, October 2019. |
|||||||||
29. L. Qiu, Z. Zhang, J. Calhoun, and Y. Lao, "Towards Data-Driven Approximate Circuit Design," Proc. of IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pp. 397-402, July 2019. |
|||||||||
30. A. Sharma, X. Zhang, and Y. Lao, "Hardware Obfuscation Through Reconfiguration Finite Field Arithmetic Units," Proc. of 2019 IEEE International Symposium on Circuits and Systems (ISCAS), May 2019. |
|||||||||
31. J. Clements and Y. Lao, "Hardware Trojan Design on Neural Networks," Proc. of 2019 IEEE International Symposium on Circuits and Systems (ISCAS), May 2019. |
|||||||||
32. J. Clements and Y. Lao, "Backdoor Attacks on Neural Network Operations," Proc. of 2018 6th IEEE Global Conference on Signal and Information Processing, pp. 1154-1158, November 2018. |
|||||||||
33. B. Zhao and Y. Lao, "Resilience of Pruned Neural Network Against Poisoning Attack," Proc. of 2018 IEEE International Conference on Malicious and Unwanted Software, pp. 78-83, October 2018. |
|||||||||
34. S. Kai, Y. Shen, Y. Lao, Z. Zhang, X. You and Chuan Zhang, "A New Error Correction Scheme for Physical Unclonable Function," Proc. of 2018 IEEE Asia Pacific Conference on Circuits and Systems, pp. 374-377, October 2018. |
|||||||||
35. Y. Wen and Y. Lao, "Efficient PUF Error Correction Through Response Weighting," Proc. of 2018 IEEE International Midwest Symposium on Circuits and Systems, August 2018. |
|||||||||
36. X. Wang and Y. Lao, "Utilizing Inherent Randomness in Stochastic Computing," Proc. of 2018 IEEE International Midwest Symposium on Circuits and Systems, August 2018. |
|||||||||
37. Y. Wen and Y. Lao, "PUF Modeling Attack using Active Learning," Proc. of 2018 IEEE International Symposium on Circuits and Systems (ISCAS), May 2018. |
|||||||||
38. L. Qiu and Y. Lao, "A Systematic Method for Approximate Circuit Design Using Feature Selection," Proc. of 2018 IEEE International Symposium on Circuits and Systems (ISCAS), May 2018. |
|||||||||
39. Y. Xu, Y. Lao, W. Liu, X. You, and C. Zhang, "DC MUX PUF: A Highly Reliable Feed-Back MUX PUF Based on Measuring Duty Cycle," Proc. of 11th International collaboration Symposium on Information, Production and Systems, pp. 883-886, November 2017. |
|||||||||
40. Y. Wen and Y. Lao, "Efficient Fuzzy Extractor Implementations for PUF Based Authentication," Proc. of 2017 IEEE International Conference on Malicious and Unwanted Software, pp. 119-125, October 2017. |
|||||||||
41. Y. Wen and Y. Lao, "Enhancing PUF Reliability by Machine Learning," Proc. of IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1-4, May 2017. |
|||||||||
42. Y. Lao and K. K. Parhi, "Data-Canonic Real FFT Flow-Graphs for Composite Lengths," Proc. of 2016 IEEE International Workshop on Signal Processing Systems, pp. 189-194, October 2016. |
|||||||||
43. C. Zhou, S. Satapathy, Y. Lao, K.K. Parhi and C.H. Kim, "Soft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs," Proc. 2016 International Symposium on Low Power Electronics and Design (ISLPED), pp. 124-129, Aug. 2016. (Best Paper Award) |
|||||||||
44. S. V. S. Avvaru, C. Zhou, S. Satapathy, Y. Lao, C. H. Kim and K. K. Parhi, "Estimating Delay Differences of Arbiter PUFs Using Silicon Data," Proc. of 2016 Design, Automation and Test in Europe (DATE), March 2016. |
|||||||||
45. Y. Lao and K. K. Parhi, "Canonic Real-Valued Radix-2n FFT Computations," Proc. of 2015 Asilomar Conference on Signals, Systems and Computers, November 2015. |
|||||||||
46. G. C. Shanmugam, Y. Lao, and K. K. Parhi, "An Obfuscated Radix-2 Real FFT Architecture," Proc. of 40th IEEE International Conference on Acoustics, Speech and Signal Processing, April 2015. |
|||||||||
47. M. Parhi, Y. Lao, and K. K. Parhi, "Canonic Real-Valued FFT Structures," Proc. of Asilomar Conference on Signals, Systems and Computers, November 2014. |
|||||||||
48. Q. Tang, B. Kim, Y. Lao, K. K. Parhi, and C. H. Kim, "True Random Number Generator Circuits based on Single- and Multi-Phase Beat Frequency Detection," Proc. of IEEE Customs Integrated Circuits Conference, pp. 1-4, September 2014. |
|||||||||
49. Y. Lao and K. K. Parhi, "Protecting DSP Circuits Through Obfuscation," Proc. of IEEE International Symposium on Circuits and Systems, pp. 798-801, June 2014. |
|||||||||
50. Y. Lao and K. K. Parhi, "Reconfigurable Architectures for Silicon Physical Unclonable Functions," Proc. of IEEE International Conference on Electro Information Technology, pp. 1-7, May 2011. |
|||||||||
51. Y. Lao and K. K. Parhi, "Novel Reconfigurable Silicon Physical Unclonable Functions," Proc. of Workshop on Foundations of Dependable and Secure Cyber-Physical Systems, pp. 30-36, April 2011. |
|||||||||
![]() |
|||||||||
1. F. B. Tarik, A. Famili, Y. Lao, and J. D. Ryckman, "Scalable and CMOS Compatible Silicon Photonic Physical Unclonable Functions for Supply Chain Assurance," Nanophotonics, 12(1), pp. 1-8, 2022. |
|||||||||
2. J. Sun, N. Sharma, J. Chakareski, N. Mastronarde, and Y. Lao, "Hardware Acceleration for Post-Decision State Reinforcement Learning in IoT Systems," IEEE Internet of Things Journal, 9(12), pp. 9889-9903, 2022. |
|||||||||
3. A. Wang, W. Tan, Y. Wen, and Y. Lao, "NoPUF: A Novel PUF Design Framework Towards Modeling Attack," IEEE Transactions on Circuits and Systems I, 68(6), pp. 2508-2521, 2021. |
|||||||||
4. W. Tan, B. Case, A. Wang, S. Gao, and Y. Lao, "High-Speed Modular Multiplier for Lattice-Based Cryptosystems," IEEE Transactions on Circuits and Systems II, 68(8), pp. 2927-2931, 2021. |
|||||||||
5. W. Tan, B. Case, G. Hu, S. Gao, and Y. Lao, "An Ultra-Highly Parallel Polynomial Multiplier for the Bootstrapping Algorithm in a Fully Homomorphic Encryption Scheme," Journal of Signal Processing Systems, pp. 1-14, 2020. |
|||||||||
6. F. B. Tarik, A. Famili, Y. Lao, and J. D. Ryckman, "Robust Optical Physical Unclonable Function Using Disordered Photonic Integrated Circuits," Nanophotonics, 9(9), pp. 2817-2828, 2020. |
|||||||||
7. Y. Xu, Y. Lao, W. Liu, Z. Zhang, X. You, and C. Zhang, "Mathematical Modeling Analysis of Strong Physical Unclonable Functions," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 32(12), pp. 4426-4438, 2020. |
|||||||||
8. X. Zhang and Y. Lao, "On the Construction of Composite Finite Fields for Hardware Obfuscation," IEEE Transactions on Computers, 68(9), pp. 1353-1364, 2019. |
|||||||||
9. Y. Lao and K. K. Parhi, "Canonic Composite Length Real-Valued FFT," Journal of VLSI Signal Processing Systems, vol. 90, pp. 1401–1414, 2018. |
|||||||||
10. Y. Lao and K. K. Parhi, "Canonic FFT Flow-Graphs for Real-Valued Even/Odd Symmetric Inputs," EURASIP Journal on Advances in Signal Processing, vol. 2017(1), p. 45, 2017. |
|||||||||
11. Y. Lao, B. Yuan, C. H. Kim and K. K. Parhi, "Reliable PUF-based Local Authentication with Self-Correction," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 36(2), pp. 201-213, 2017. |
|||||||||
12. Y. Lao, Q. Tang, C. H. Kim, and K. K. Parhi, "Beat Frequency Detector based True Random Number Generator: Statistical Modeling and Analysis," ACM Journal on Emerging Technologies in Computing Systems, 13(1), Article 9, 2016. |
|||||||||
13. Y. Lao and K. K. Parhi, "Obfuscating DSP Circuits via High-Level Transformations," IEEE Transactions on Very Large Scale Integration Systems, 23(5), pp. 819-830, 2015. (IEEE CAS Society Very Large Scale Integration Best Paper Award) |
|||||||||
14. Y. Lao and K. K. Parhi, "Statistical Analysis of MUX-based Physical Unclonable Functions," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 33(5), pp. 649-662, 2014. |
|||||||||
15. M. Ayinala, Y. Lao, and K. K. Parhi, "An In-Place FFT Architecture for Real-Valued Signals," IEEE Transactions on Circuits and Systems II, 60(10), pp. 652-656, 2013. |
|||||||||