• Publications
  • Influence
Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices
TLDR
We propose a secure and lightweight authentication protocol for resource scarce pervasive devices built upon a physical unclonable function (PUF) primitive and a variant of a parameter-based authentication protocol. Expand
  • 41
  • 6
  • PDF
CBF1 is clinically prognostic and serves as a target to block cellular invasion and chemoresistance of EMT-like glioblastoma cells
Background:Glioblastoma is the most common and most lethal primary brain cancer. CBF1 (also known as Recombination signal Binding Protein for immunoglobulin kappa J, RBPJ) is the cardinalExpand
  • 16
  • 3
Understanding Mechanism of Adsorption in the Decolorization of Aqueous Methyl Violet (6B) Solution by Okra Polysaccharides: Experiment and Theory
Optimal conditions for ultrasonic-assisted extraction of polysaccharide from Chinese okra were found using response surface methodology. The okra polysaccharide (OPS) was used for the adsorption ofExpand
  • 3
Exploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs
TLDR
We propose an improved guess-and-determine attack against NFSR-based stream ciphers and demonstrate the application of the technique to successfully cryptanalyse the lightweight cipher Sprout. Expand
  • 2
  • PDF
A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs
TLDR
Physical Unclonable Functions (PUFs), as novel lightweight hardware security primitives, provide a higher level security with lower power and area overhead in comparison with traditional cryptographic solutions. Expand
  • 5
  • PDF
Honeynet Construction Based on Intrusion Detection
As a network defense technology, honeypot can take the initiative to respond to external attacks, with high reliability and convenient management. In the current complex industrial control networkExpand
  • 3
Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher
TLDR
We evaluate Pandaka and demonstrate that the communication protocol contains flaws which completely undermine the security of the cipher and make Pandaka susceptible to de-synchronisation. Expand
  • 1
  • PDF
Android Malware Detection Based on Convolutional Neural Networks
TLDR
We proposed an Android malware detection framework based on Convolutional Neural Network (CNN) for large-scale and automation detection. Expand
  • 1
Exploiting PUF Models for Error Free Response Generation
TLDR
We exploit a statistical model of an Arbiter PUF (APUF) constructed under the nominal operating condition during the challenge response enrollment phase by a trusted party to judiciously select challenges that yield error-free responses even across a wide operating conditions, specifically, a 20% supply voltage variation and a 40% temperature variation. Expand
  • 2
  • PDF
FairMod - Making Predictive Models Discrimination Aware
TLDR
This paper proposes a method to post-process the predictions of a predictive model to make the processed predictions non-discriminatory. Expand