• Publications
  • Influence
Coverage problems in wireless ad-hoc sensor networks
TLDR
Wireless ad-hoc sensor networks have recently emerged as a premier research topic. Expand
  • 1,878
  • 77
  • PDF
EPIC: Ending Piracy of Integrated Circuits
TLDR
We propose a novel comprehensive technique to end piracy of integrated circuits (EPIC). Expand
  • 418
  • 69
  • PDF
A Survey of Hardware Trojan Taxonomy and Detection
TLDR
This article presents a classification of hardware Trojans and a survey of published techniques for Trojan detection. Expand
  • 951
  • 61
  • PDF
Physical Unclonable Functions and Applications: A Tutorial
TLDR
This paper describes the use of physical unclonable functions (PUFs) in low-cost authentication and key generation applications. Expand
  • 508
  • 56
  • PDF
Exposure in wireless Ad-Hoc sensor networks
TLDR
We propose an efficient and effective algorithm for exposure calculation in sensor networks, specifically for finding minimal exposure paths. Expand
  • 707
  • 34
  • PDF
Advances and Open Problems in Federated Learning
TLDR
Federated learning (FL) is a machine learning setting where many clients (e.g. mobile devices or whole organizations) collaboratively train a model under the orchestration of a central server, while keeping the training data decentralized. Expand
  • 323
  • 33
  • PDF
Ending Piracy of Integrated Circuits
TLDR
An effective technique to combat IC piracy is to render infringement impractical by making physical tampering unprofitable and attacks computationally infeasible. Expand
  • 186
  • 33
  • PDF
Heart-to-heart (H2H): authentication for implanted medical devices
TLDR
We present Heart-to-Heart (H2H), a system to authenticate external medical device controllers and programmers to Implantable Medical Devices (IMDs), a therapeutic medical devices partially or wholly embedded in the human body. Expand
  • 154
  • 32
  • PDF
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications
TLDR
We present Chameleon, a novel hybrid (mixed-protocol) framework for secure function evaluation (SFE) which enables two parties to jointly compute a function without disclosing their private inputs. Expand
  • 164
  • 23
  • PDF
Worst and best-case coverage in sensor networks
TLDR
We propose an optimal polynomial time worst and average case algorithm for coverage calculation for homogeneous isotropic sensors. Expand
  • 366
  • 22
  • PDF