Farinaz Koushanfar
#12,516
Most Influential Person Now
Iranian-American computer scientist
Farinaz Koushanfar's AcademicInfluence.com Rankings
Farinaz Koushanfarengineering Degrees
Engineering
#431
World Rank
#745
Historical Rank
Electrical Engineering
#79
World Rank
#92
Historical Rank
Farinaz Koushanfarcomputer-science Degrees
Computer Science
#1220
World Rank
#1260
Historical Rank
Computer Architecture
#36
World Rank
#37
Historical Rank
Database
#2424
World Rank
#2541
Historical Rank
Download Badge
Engineering Computer Science
Farinaz Koushanfar's Degrees
- PhD Electrical Engineering Stanford University
- Masters Electrical Engineering Stanford University
- Bachelors Electrical Engineering Sharif University of Technology
Why Is Farinaz Koushanfar Influential?
(Suggest an Edit or Addition)According to Wikipedia, Farinaz Koushanfar is an Iranian-American computer scientist whose research concerns embedded systems, ad-hoc networks, and computer security. She is a professor and Henry Booker Faculty Scholar of Electrical and Computer Engineering at the University of California, San Diego.
Farinaz Koushanfar's Published Works
Published Works
- Advances and Open Problems in Federated Learning (2019) (2826)
- Coverage problems in wireless ad-hoc sensor networks (2001) (1910)
- A Survey of Hardware Trojan Taxonomy and Detection (2010) (1173)
- Physical Unclonable Functions and Applications: A Tutorial (2014) (792)
- Exposure in wireless Ad-Hoc sensor networks (2001) (711)
- EPIC: Ending Piracy of Integrated Circuits (2008) (553)
- A Primer on Hardware Security: Models, Methods, and Metrics (2014) (471)
- Worst and best-case coverage in sensor networks (2005) (382)
- Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications (2018) (339)
- Active Hardware Metering for Intellectual Property Protection and Security (2007) (333)
- Lightweight secure PUFs (2008) (317)
- DeepSecure: Scalable Provably-Secure Deep Learning (2017) (291)
- Ending Piracy of Integrated Circuits (2010) (258)
- Techniques for Design and Implementation of Secure Reconfigurable PUFs (2009) (230)
- DeepInspect: A Black-box Trojan Detection and Mitigation Framework for Deep Neural Networks (2019) (218)
- Heart-to-heart (H2H): authentication for implanted medical devices (2013) (203)
- On-line fault detection of sensor measurements (2003) (202)
- Testing Techniques for Hardware Security (2008) (199)
- XONN: XNOR-based Oblivious Deep Neural Network Inference (2019) (193)
- Exposure in Wireless Sensor Networks: Theory and Practical Solutions (2002) (192)
- Fault tolerance techniques for wireless ad hoc sensor networks (2002) (191)
- TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits (2015) (184)
- Remote activation of ICs for piracy prevention and digital right management (2007) (183)
- Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching (2012) (178)
- Security Based on Physical Unclonability and Disorder (2012) (172)
- FPGA PUF using programmable delay lines (2010) (171)
- Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching (2014) (143)
- Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management (2012) (138)
- Hardware metering (2001) (131)
- FPGA-Based True Random Number Generation Using Circuit Metastability with Adaptive Feedback Control (2011) (129)
- Efficient Power and Timing Side Channels for Physical Unclonable Functions (2014) (128)
- Combined Modeling and Side Channel Attacks on Strong PUFs (2013) (122)
- Hardware security: Threat models and metrics (2013) (121)
- Peer-to-peer Federated Learning on Graphs (2019) (114)
- Invited: Things, trouble, trust: On building trust in IoT systems (2016) (114)
- A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection (2011) (111)
- Consistency-based characterization for IC Trojan detection (2009) (102)
- Behavioral synthesis techniques for intellectual property protection (2005) (99)
- DeepSigns: An End-to-End Watermarking Framework for Ownership Protection of Deep Neural Networks (2019) (96)
- DeepSigns: A Generic Watermarking Framework for IP Protection of Deep Learning Models (2018) (91)
- Novel Techniques for High-Sensitivity Hardware Trojan Detection Using Thermal and Power Maps (2014) (91)
- ReBNet: Residual Binarized Neural Network (2017) (87)
- Intellectual Property Metering (2001) (87)
- PUFatt: Embedded platform attestation based on novel processor-based PUFs (2014) (85)
- System-architectures for sensor networks issues, alternatives, and directions (2002) (84)
- DeepMarks: A Secure Fingerprinting Framework for Digital Rights Management of Deep Learning Models (2019) (84)
- Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples (2020) (83)
- Automated Synthesis of Optimized Circuits for Secure Computation (2015) (82)
- LookNN: Neural network with no multiplication (2017) (80)
- Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach (2008) (80)
- High-sensitivity hardware Trojan detection using multimodal characterization (2013) (74)
- Balancing security and utility in Medical Devices? (2013) (73)
- Universal Adversarial Perturbations for Speech Recognition Systems (2019) (73)
- Fault Tolerance in Wireless Ad-Hoc Sensor Networks (2007) (70)
- Time-Bounded Authentication of FPGAs (2011) (70)
- Hardware Metering: A Survey (2012) (66)
- Sleeping Coordination for Comprehensive Sensing Using Isotonic Regression and Domatic Partitions (2006) (62)
- Robust stable radiometric fingerprinting for wireless devices (2009) (59)
- CAD-based Security, Cryptography, and Digital Rights Management (2007) (59)
- A Framework for Collaborative Learning in Secure High-Dimensional Space (2019) (58)
- Pushing the Communication Barrier in Secure Computation using Lookup Tables (2017) (56)
- Can EDA combat the rise of electronic counterfeiting? (2012) (55)
- A Taxonomy of Attacks on Federated Learning (2021) (54)
- Idetic: A high-level synthesis approach for enabling long computations on transiently-powered ASICs (2013) (53)
- Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry (2012) (51)
- Extended abstract: Circuit CAD tools as a security threat (2008) (51)
- GTX: the MARCO GSRC technology extrapolation system (2000) (51)
- Input vector control for post-silicon leakage current minimization in the presence of manufacturing variability (2008) (49)
- Fault Tolerance in Wireless Sensor Networks (2004) (48)
- DeLight: Adding Energy Dimension To Deep Neural Networks (2016) (47)
- EDA for secure and dependable cybercars: Challenges and opportunities (2012) (46)
- Post-silicon timing characterization by compressed sensing (2008) (46)
- DeepMarks: A Digital Fingerprinting Framework for Deep Neural Networks (2018) (45)
- Integrated circuits metering for piracy protection and digital rights management: an overview (2011) (43)
- LaserSPECks: Laser SPECtroscopic Trace-Gas Sensor Networks - Sensor Integration and Applications (2007) (43)
- Quo vadis, PUF?: Trends and challenges of emerging physical-disorder based security (2014) (43)
- Active control and digital rights management of integrated circuit IP cores (2008) (42)
- Customizing Neural Networks for Efficient FPGA Implementation (2017) (42)
- Processors for mobile applications (2000) (41)
- Protecting bus-based hardware IP by secret sharing (2008) (41)
- DeepFense: Online Accelerated Defense Against Adversarial Deep Learning (2017) (41)
- Provably secure obfuscation of diverse watermarks for sequential circuits (2010) (40)
- Coda: An End-to-End Neural Program Decompiler (2019) (40)
- RAPIDNN: In-Memory Deep Neural Network Acceleration Framework (2018) (40)
- Safe Machine Learning and Defeating Adversarial Attacks (2018) (39)
- FLAME: Taming Backdoors in Federated Learning (2021) (38)
- Shielding and securing integrated circuits with sensors (2014) (38)
- SVD-Based Ghost Circuitry Detection (2009) (38)
- Ultra-low power current-based PUF (2011) (37)
- Coding-based energy minimization for Phase Change Memory (2012) (35)
- HypoEnergy. Hybrid supercapacitor-battery power-supply optimization for Energy efficiency (2011) (35)
- Provably complete hardware Trojan detection using test point insertion (2012) (34)
- Compacting privacy-preserving k-nearest neighbor search using logic synthesis (2015) (34)
- SparseHD: Algorithm-Hardware Co-optimization for Efficient High-Dimensional Computing (2019) (33)
- Location Discovery in Ad-hoc Wireless Sensor Networks (2004) (33)
- Extended abstract: Designer’s hardware Trojan horse (2008) (32)
- Automated Design, Implementation, and Evaluation of Arbiter-based PUF on FPGA using Programmable Delay Lines (2014) (31)
- DeepAttest: An End-to-End Attestation Framework for Deep Neural Networks (2019) (31)
- A Timing Channel Spyware for the CSMA/CA Protocol (2013) (30)
- Adversarial Reprogramming of Text Classification Neural Networks (2018) (30)
- Power and Timing Side Channels for PUFs and their Efficient Exploitation (2013) (30)
- WaveGuard: Understanding and Mitigating Audio Adversarial Examples (2021) (29)
- BlackMarks: Blackbox Multibit Watermarking for Deep Neural Networks (2019) (29)
- Deep Learning on Private Data (2019) (29)
- Rapid FPGA delay characterization using clock synthesis and sparse sampling (2010) (29)
- GarbledCPU: A MIPS processor for secure computation in hardware (2016) (28)
- Challenges and opportunities in broadband and wireless communication designs (2000) (28)
- FPGA Time-Bounded Unclonable Authentication (2010) (27)
- BioChipWork: Reverse Engineering of Microfluidic Biochips (2017) (26)
- Hierarchical hybrid power supply networks (2010) (26)
- ClockPUF: Physical Unclonable Functions based on clock networks (2013) (26)
- Deep3: Leveraging three levels of parallelism for efficient Deep Learning (2017) (26)
- Low power coordination in wireless ad-hoc networks (2003) (25)
- CleaNN: Accelerated Trojan Shield for Embedded Neural Networks (2020) (24)
- SSketch: An Automated Framework for Streaming Sketch-Based Analysis of Big Data on FPGA (2015) (24)
- A Built-in-Self-Test Scheme for Online Evaluation of Physical Unclonable Functions and True Random Number Generators (2016) (23)
- Design and Analysis of Secure and Dependable Automotive CPS: A Steer-by-Wire Case Study (2020) (23)
- A Unified Submodular Framework for Multimodal IC Trojan Detection (2010) (23)
- Automated checkpointing for enabling intensive applications on energy harvesting devices (2013) (23)
- Noninvasive leakage power tomography of integrated circuits by compressive sensing (2008) (23)
- Markov chain-based models for missing and faulty data in MICA2 sensor motes (2005) (23)
- BIST-PUF: Online, hardware-based evaluation of physically unclonable circuit identifiers (2014) (22)
- DeepSigns: An End-to-End Watermarking Framework for Protecting the Ownership of Deep Neural Networks (2018) (22)
- MAXelerator: FPGA Accelerator for Privacy Preserving Multiply-Accumulate (MAC) on Cloud Servers (2018) (22)
- Deep Learning Acceleration with Neuron-to-Memory Transformation (2020) (21)
- Processor-Based Strong Physical Unclonable Functions With Aging-Based Response Tuning (2014) (21)
- Designer's Hardware Trojan Horse. (2008) (21)
- Sensor Network Architecture (2004) (20)
- Techniques for foundry identification (2014) (20)
- N-variant IC design: Methodology and applications (2008) (20)
- Gate Characterization Using Singular Value Decomposition: Foundations and Applications (2012) (19)
- I Know Where You are: Proofs of Presence Resilient to Malicious Provers (2015) (19)
- FastWave: Accelerating Autoregressive Convolutional Neural Networks on FPGA (2019) (19)
- ERROR-TOLERANT MULTI-MODAL SENSOR FUSION (2002) (18)
- Perform-ML: Performance optimized machine learning by platform and content aware customization (2016) (17)
- ProFlip: Targeted Trojan Attack with Progressive Bit Flips (2021) (17)
- SemiHD: Semi-Supervised Learning Using Hyperdimensional Computing (2019) (17)
- Privacy preserving localization for smart automotive systems (2016) (17)
- MetaCores: design and optimization techniques (2001) (16)
- MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation (2019) (15)
- ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning (2021) (15)
- Deepsecure (2018) (15)
- FASE: FPGA Acceleration of Secure Function Evaluation (2019) (15)
- GenUnlock: An Automated Genetic Algorithm Framework for Unlocking Logic Encryption (2019) (15)
- Decentralized Bayesian Learning over Graphs (2019) (15)
- Scratch that! An Evolution-based Adversarial Attack against Neural Networks (2019) (14)
- CuRTAIL: ChaRacterizing and Thwarting AdversarIal Deep Learning (2017) (14)
- ARM2GC: Succinct Garbled Processor for Secure Computation (2019) (14)
- Chime: Checkpointing Long Computations on Interm ittently Energized IoT Devices (2016) (14)
- CAMsure: Secure Content-Addressable Memory for Approximate Search (2017) (13)
- RankMap: A Platform-Aware Framework for Distributed Learning from Dense Datasets (2015) (12)
- Integrated circuit digital rights management techniques using physical level characterization (2011) (12)
- Automated Real-Time Analysis of Streaming Big and Dense Data on Reconfigurable Platforms (2016) (12)
- Performance Comparison of Contemporary DNN Watermarking Techniques (2018) (12)
- Error models for light sensors by statistical analysis of raw sensor measurements (2004) (12)
- Anti-Collusion Position Estimation in Wireless Sensor Networks (2007) (12)
- Privacy-Preserving Deep Learning and Inference (2018) (12)
- Sub-Linear Privacy-Preserving Near-Neighbor Search (2016) (11)
- CryptoML: Secure outsourcing of big data machine learning applications (2016) (11)
- DeepSigns (2019) (11)
- CodeX: Bit-Flexible Encoding for Streaming-based FPGA Acceleration of DNNs (2019) (11)
- Can the SHIELD protect our integrated circuits? (2014) (11)
- Learning to manage combined energy supply systems (2011) (11)
- Active Hardware Metering by Finite State Machine Obfuscation (2017) (11)
- EncoDeep: Realizing Bit-flexible Encoding for Deep Neural Networks (2020) (11)
- Evolving EDA beyond its E-roots: An overview (2015) (10)
- RISE (2017) (10)
- Expressive Neural Voice Cloning (2021) (10)
- Peeking Into the Black Box: A Tutorial on Automated Design Optimization and Parameter Search (2019) (10)
- TAD: Trigger Approximation based Black-box Trojan Detection for AI (2021) (10)
- SynFi: Automatic Synthetic Fingerprint Generation (2020) (10)
- Editorial: Low-Power, Intelligent, and Secure Solutions for Realization of Internet of Things (2013) (10)
- Techniques for maintaining connectivity in wireless ad-hoc networks under energy constraints (2007) (10)
- PriSearch: Efficient search on private data (2017) (10)
- Toward Practical Secure Stable Matching (2017) (10)
- Trustworthy AI Inference Systems: An Industry Research View (2020) (9)
- BlackMarks: Black-box Multi-bit Watermarking for Deep Neural Networks (2018) (9)
- TinyGarble2: Smart, Efficient, and Scalable Yao's Garble Circuit (2020) (9)
- 20 Years of research on intellectual property protection (2017) (9)
- DeepSigns : A Generic Watermarking Framework for Protecting the Ownership of Deep Learning Models (2018) (8)
- Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms (2019) (8)
- Towards Safe Deep Learning: Unsupervised Defense Against Generic Adversarial Attacks (2018) (8)
- AutoRank: Automated Rank Selection for Effective Neural Network Customization (2021) (8)
- Design and performance analysis of secure and dependable cybercars: A steer-by-wire case study (2016) (8)
- An Energy-Efficient Last-Level Cache Architecture for Process Variation-Tolerant 3D Microprocessors (2015) (8)
- SWNet: Small-World Neural Networks and Rapid Convergence (2019) (8)
- LiteTransformerSearch: Training-free On-device Search for Efficient Autoregressive Language Models (2022) (7)
- High-performance optimizations on tiled many-core embedded systems: a matrix multiplication case study (2013) (7)
- Flexible ASIC: shared masking for multiple media processors (2005) (7)
- ReDCrypt: Real-Time Privacy-Preserving Deep Learning Inference in Clouds Using FPGAs (2018) (7)
- GenMatch: Secure DNA compatibility testing (2016) (7)
- Cross-modal Adversarial Reprogramming (2021) (7)
- Sub-Linear Privacy-Preserving Near-Neighbor Search with Untrusted Server on Large-Scale Datasets (2016) (7)
- TinyDL: Just-in-time deep learning solution for constrained embedded systems (2017) (7)
- Guest Editors' Introduction: Confronting the Hardware Trustworthiness Problem (2010) (7)
- GeneCAI: genetic evolution for acquiring compact AI (2020) (7)
- SpecMark: A Spectral Watermarking Framework for IP Protection of Speech Recognition Systems (2020) (7)
- Robust privacy-preserving fingerprint authentication (2016) (7)
- Adversarial Reprogramming of Sequence Classification Neural Networks (2018) (7)
- N-version temperature-aware scheduling and binding (2009) (7)
- Localized Algorithms for Sensor Networks (2018) (7)
- Hybrid heterogeneous energy supply networks (2011) (6)
- Principal Component Properties of Adversarial Samples (2019) (6)
- A probabilistic constructive approach to optimization problems (2001) (6)
- DeepMarks (2019) (6)
- A Singular Value Perspective on Model Robustness (2020) (6)
- RISE: An Automated Framework for Real-Time Intelligent Video Surveillance on FPGA (2017) (6)
- Chapter 1 FPGA-oriented Security (2011) (6)
- Phase Change Memory Write Cost Minimization by Data Encoding (2015) (6)
- What is hardware security? (2010) (6)
- Exposing Vulnerabilities of Deepfake Detection Systems with Robust Attacks (2022) (6)
- COINN: Crypto/ML Codesign for Oblivious Inference via Neural Networks (2021) (6)
- Watermarking Technique for Sensor Networks: Foundations and Applications (2006) (6)
- CausaLearn: Automated Framework for Scalable Streaming-based Causal Bayesian Learning using FPGAs (2018) (6)
- A queueing theoretic approach for performance evaluation of low-power multi-core embedded systems (2011) (6)
- Nonparametric Combinatorial Regression for Shape Constrained Modeling (2010) (5)
- Trojan Signatures in DNN Weights (2021) (5)
- Sub-linear Privacy-preserving Search with Untrusted Server and Semi-honest Parties (2016) (5)
- ILP-based engineering change (2002) (5)
- Unsupervised Information Obfuscation for Split Inference of Neural Networks (2021) (5)
- AgileNet: Lightweight Dictionary-based Few-shot Learning (2018) (5)
- SHAIP: Secure Hamming Distance for Authentication of Intrinsic PUFs (2018) (5)
- HASHTAG: Hash Signatures for Online Detection of Fault-Injection Attacks on Deep Neural Networks (2021) (5)
- On the Application of Binary Neural Networks in Oblivious Inference (2021) (5)
- FaceSigns: Semi-Fragile Neural Watermarks for Media Authentication and Countering Deepfakes (2022) (5)
- Global error-tolerant algorithms for location discovery in ad-hoc wireless Netoworks (2002) (4)
- LaserSPECks: : laser SPECtroscopic trace-gas sensor networks - sensor integration and applications (2007) (4)
- DeepFense (2018) (4)
- Hardware Security: Preparing Students for the Next Design Frontier (2007) (4)
- SimBNN: A Similarity-Aware Binarized Neural Network Acceleration Framework (2019) (4)
- CAMsure (2017) (4)
- ResBinNet: Residual Binary Neural Network (2017) (4)
- Hybrid modeling of non-stationary process variations (2011) (4)
- Trusted Design in FPGAs (2012) (4)
- P3: Privacy Preserving Positioning for Smart Automotive Systems (2018) (4)
- Going deeper than deep learning for massive data analytics under physical constraints (2016) (4)
- Robust Stable Radiometric Fingerprinting for Frequency Reconfigurable Devices. (2009) (4)
- Flexible Transformations For Learning Big Data (2015) (3)
- Guest Editorial Special Section on Hardware Security and Trust (2015) (3)
- FlowTrojan: Insertion and Detection of Hardware Trojans on Flow-Based Microfluidic Biochips (2020) (3)
- Enhancing Model Parallelism in Neural Architecture Search for Multidevice System (2020) (3)
- Symbolic debugging scheme for optimized hardware and software (2000) (3)
- Can We Trust the Chips of the Future? (2011) (3)
- Interacting Particle-Based Model for Missing Data in Sensor Networks: Foundations and Applications (2006) (3)
- AdaNS: Adaptive Non-Uniform Sampling for Automated Design of Compact DNNs (2020) (3)
- Developing Privacy-preserving AI Systems: The Lessons learned (2020) (3)
- ReDCrypt (2018) (3)
- RICHARD FEYNMAN: SIMULATING PHYSICS WITH COMPUTERS (2004) (3)
- Trustworthy Hardware [Scanning the Issue] (2014) (3)
- Text Revealer: Private Text Reconstruction via Model Inversion Attacks against Transformers (2022) (2)
- Backdoor Defense in Federated Learning Using Differential Testing and Outlier Detection (2022) (2)
- AdaTest: Reinforcement Learning and Adaptive Sampling for On-chip Hardware Trojan Detection (2022) (2)
- ASCAI: Adaptive Sampling for acquiring Compact AI (2019) (2)
- Security of Microfluidic Biochip (2020) (2)
- Adversarial Scratches: Deployable Attacks to CNN Classifiers (2022) (2)
- Fine-Grained Voltage Boosting for Improving Yield in Near-Threshold Many-Core Processors (2015) (2)
- Water end-use consumption in low-income households: Evaluation of the impact of preprocessing on the construction of a classification model (2021) (2)
- RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression (2022) (2)
- Probabilistic constructive optimization techniques (2004) (2)
- AccHashtag: Accelerated Hashing for Detecting Fault-Injection Attacks on Embedded Neural Networks (2022) (2)
- DA systemization of knowledge: A catalog of prior forward-looking initiatives (2015) (2)
- ARM2GC: Simple and Efficient Garbled Circuit Framework by Skipping (2017) (2)
- PerD: Perturbation Sensitivity-based Neural Trojan Detection Framework on NLP Applications (2022) (2)
- AHEC: End-to-end Compiler Framework for Privacy-preserving Machine Learning Acceleration (2020) (2)
- Adversarial Attacks on Deep Learning-based Video Compression and Classification Systems (2022) (2)
- GLOBAL ERROR-TOLERANT ALGORITHM S FOR LOCATION DISCOVERY IN WIRELESS AD-HOC NETWORK S (2001) (1)
- Machine learning-assisted E-jet printing for manufacturing of organic flexible electronics. (2022) (1)
- P3 (2018) (1)
- Post-silicon Resource Binding Customization for Low Power (2011) (1)
- MAXelerator (2018) (1)
- Flexible Transformations For Learning Big Data (2015) (1)
- RankMap: A Framework for Distributed Learning From Dense Data Sets (2015) (1)
- AHEAD: Automated framework for hardware accelerated iterative data analysis (2015) (1)
- Unified Architectural Support for Secure and Robust Deep Learning (2020) (1)
- Physical Unclonable Functions and Applications: A Tutorial This paper is a tutorial on ongoing work in physical-disorder-based security, security analysis, and implementation choices. (2014) (1)
- Low-power resource binding by postsilicon customization (2013) (1)
- DeepAttest (2019) (1)
- Automated Analysis of Streaming Big and Dense Data on Reconfigurable Platforms (2018) (1)
- Provably Secure Sequential Obfuscation for IC Metering and Piracy Avoidance (2021) (1)
- Multiple statistical validations for sensor networks optimization (2008) (1)
- Chime : Ch eckpointing long computations on i nter m ittently e nergized IoT devices (2016) (1)
- Chapter 1 Hardware Metering : A Survey (2011) (1)
- ReDCrypt: RealTime Privacy Preserving Deep Learning Using FPGAs (2018) (1)
- Confronting the Hardware Trustworthiness Problem (2010) (1)
- ReFace: Real-time Adversarial Attacks on Face Recognition Systems (2022) (1)
- Challenging benchmark for location discovery in ad hoc networks: foundations and applications (2008) (1)
- D2Cyber: A design automation tool for dependable cybercars (2014) (1)
- (Bio)-Behavioral CAD (2008) (1)
- A Neural-based Program Decompiler (2019) (1)
- Trusting the open latent IC backdoors (2011) (1)
- LiteTransformerSearch: Training-free Neural Architecture Search for Efficient Language Models (2022) (1)
- Peer-to-Peer Variational Federated Learning Over Arbitrary Graphs (2022) (1)
- Machine Learning-Assisted E-jet Printing of Organic Flexible Biosensors (2021) (1)
- Integration of Statistical Techniques in the Design Curriculum (2007) (1)
- Ensuring data integrity in sensor-based networked systems (2005) (1)
- Tutorial: Towards Robust Deep Learning against Poisoning Attacks (2022) (1)
- FastStamp: Accelerating Neural Steganography and Digital Watermarking of Images on FPGAs (2022) (1)
- Input vector control for post-silicon leakage current minimization under manufacturing variations (2008) (1)
- Grand Challenges for Embedded Security Research in a Connected World (2020) (1)
- The Fusion of Secure Function Evaluation and Logic Synthesis (2021) (0)
- Phase Change Memory Write Cost Minimization (2015) (0)
- Hop-by-hop or longer hops: The energy perspective (2008) (0)
- GALU: A Genetic Algorithm Framework for Logic Unlocking (2021) (0)
- Hybrid Spatial Modeling of Non-Stationary Process Variations (2011) (0)
- CleaNN (2020) (0)
- An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks (2022) (0)
- D2CyberSoft: A design automation tool for soft error analysis of Dependable Cybercars (2016) (0)
- Machine Learning on Encrypted Data: Hardware to the Rescue (2021) (0)
- Multisketches (2019) (0)
- The Challenges of Model Objective Selection and Estimation for Ad-hoc Network Data Sets (2008) (0)
- SenseHash: Computing on Sensor Values Mystified At the Origin (2022) (0)
- Active Watermarking of Data and Information in Wireless Ad-hoc Sensor Networks (2002) (0)
- Low Power Network Discovery Algorithms (2003) (0)
- NetFlick: Adversarial Flickering Attacks on Deep Learning Based Video Compression (2023) (0)
- Assured Deep Learning: Practical Defense Against Adversarial Attacks (2018) (0)
- VSIA ( Virtual Socket Initiative Alliance ) Intellectual Property Metering (2001) (0)
- FastStamp (2022) (0)
- Session details: Design automation and defect tolerance techniques for emerging technologies (2007) (0)
- CyCAR'2013: first international academic workshop on security, privacy and dependability for cybervehicles (2013) (0)
- Sensor Networks and Low Power Coordination in Wireless Ad-hoc Networks (2003) (0)
- Privacy Concerns in Deep Learning (2018) (0)
- Lifetime Optimization Using Energy Allocation in Wireless Ad-hoc Networks (2008) (0)
- BIST for Online Evaluation of PUFs and TRNGs (2017) (0)
- Training Data Encoded data Unlabeled Data Labeled Data Encoder Encoder Label Encoded Training Data Class 1 vector Class 2 vector Class k vector HD Model Labeling Data / Model Expansion Label Model Generation (2019) (0)
- High-performance optimizations on tiled many-core embedded systems: a matrix multiplication case study (2013) (0)
- GeneCAI (2020) (0)
- ARM2GC (2019) (0)
- Tailor: Altering Skip Connections for Resource-Efficient Inference (2023) (0)
- ExtDict: Extensible Dictionaries for Data- and Platform-Aware Large-Scale Learning (2017) (0)
- A Timing Channel Spyware Robust to MAC Random Back-off (2010) (0)
- SWANN: Small-World Architecture for Fast Convergence of Neural Networks (2021) (0)
- zPROBE: Zero Peek Robustness Checks for Federated Learning (2022) (0)
- DELIGHT (2022) (0)
- ASHES 2017: Workshop on Attacks and Solutions in Hardware Security (2017) (0)
- Real time emulations: Foundation and applications (2010) (0)
- 2015 JETTA Reviewers (2016) (0)
- How challenging is modeling of a data set ? (2007) (0)
- ERROR-TOLERANT MULTI-MODAL SENSOR FUSION ( SHORT PAPER ) (0)
- SHAIP (2018) (0)
- Adapting Skip Connections for Resource-Efficient FPGA Inference (2023) (0)
- Intellectual Property (IP) Protection for Deep Learning and Federated Learning Models (2022) (0)
- A Unified Framework for Multimodal IC Trojan Detection (2010) (0)
- 3 PIP Vendor SoC Integrator Foundry User O 1 2 3 ? ? ? O ? ? ? O 4 5 6 O ? O 7 8 ? O ? ? ? C C C O ? ? ? (2013) (0)
- Editorial for TODAES Special Issue on Internet of Things System Performance, Reliability, and Security (2018) (0)
- EncoDeep (2020) (0)
- IC Piracy Protection by APUF and Logic Obfuscation (2014) (0)
- Session details: Wild and crazy ideas (2012) (0)
- Hardware-based machine learning acceleration (2018) (0)
- Efficient Power and Timing Side Channels on PUFs (2014) (0)
- SIP5: Understanding and Controlling Instrumented Physical Systems:Modeling is Complex, but Optimization is Easy (2005) (0)
- Symbolic debugging of embedded hardware and software (2001) (0)
- TinyGarble2 (2020) (0)
- Session details: Keynote address (2013) (0)
- Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning (2023) (0)
- Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012 (2012) (0)
- Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature (2022) (0)
- Hardware/Algorithm Codesign for Adversarially Robust Deep Learning (2021) (0)
- LaserSPECks: LaserSPECtroscopic Trace-Gas Sensor Networks -SensorIntegration andApplications (2007) (0)
This paper list is powered by the following services:
Other Resources About Farinaz Koushanfar
What Schools Are Affiliated With Farinaz Koushanfar?
Farinaz Koushanfar is affiliated with the following schools: