Akshay Wali

ORCID: 0000-0002-4632-687X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Memory and Neural Computing
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Ferroelectric and Negative Capacitance Devices
  • 2D Materials and Applications
  • Neuroscience and Neural Engineering
  • Cell Image Analysis Techniques
  • Perovskite Materials and Applications
  • Integrated Circuits and Semiconductor Failure Analysis
  • Advancements in Semiconductor Devices and Circuit Design
  • Biochemical Analysis and Sensing Techniques
  • Graphene research and applications
  • Chaos-based Image/Signal Encryption
  • Cryptography and Data Security
  • Quantum-Dot Cellular Automata
  • Adversarial Robustness in Machine Learning
  • Analytical Chemistry and Sensors
  • Advanced Sensor and Energy Harvesting Materials
  • Semiconductor materials and devices
  • Advanced Machining and Optimization Techniques
  • Advanced Materials and Mechanics
  • Electrochemical sensors and biosensors
  • Silicon and Solar Cell Technologies
  • MXene and MAX Phase Materials
  • Conducting polymers and applications
  • Advanced Surface Polishing Techniques

Pennsylvania State University
2017-2024

Jackson State University
2024

Argonne National Laboratory
2024

Abstract Information security is one of the foundational requirements for any modern society thriving on digital connectivity. At present, information accomplished either through software algorithms or hardware protocols. Software use pseudo random numbers generated by one-way mathematical functions that are computationally robust in classical era, but shown to become vulnerable post-quantum era. Hardware overcomes such limitations physically unclonable (PUFs) exploit manufacturing process...

10.1038/s42005-019-0139-3 article EN cc-by Communications Physics 2019-04-26

Abstract The increased demand of high‐performance computing systems has exposed the inherent limitations current state‐of‐the‐art von Neumann architecture. Therefore, developing alternate primitives that can offer faster speed with low energy expenditure is critical. In this context, while several non‐volatile memory (NVM) devices such as synaptic transistors, spintronic devices, phase change (PCM), and memristors have been demonstrated in past, their two‐terminal nature necessitates...

10.1002/adfm.202308129 article EN Advanced Functional Materials 2023-10-22

Animal behavior involves complex interactions between physiology and psychology. However, most AI systems neglect psychological factors in decision-making due to a limited understanding of the physiological-psychological connection at neuronal level. Recent advancements brain imaging genetics have uncovered specific neural circuits that regulate behaviors like feeding. By developing neuro-mimetic incorporate both psychology, new emotional-AI paradigm can be established bridges gap humans...

10.1038/s41467-023-41046-7 article EN cc-by Nature Communications 2023-09-27

A true random number generator (TRNG) is a critical hardware component that has become increasingly important in the era of Internet Things (IoT) and mobile computing for ensuring secure communication authentication schemes. While recent years have seen an upsurge TRNGs based on nanoscale materials devices, their resilience against machine learning (ML) attacks remains unexamined. In this article, we demonstrate ML attack resilient, low-power, low-cost TRNG by exploiting stochastic...

10.1021/acsnano.1c05984 article EN ACS Nano 2021-10-19

Reverse engineering (RE) is one of the major security threats to semiconductor industry due involvement untrustworthy parties in an increasingly globalized chip manufacturing supply chain. RE efforts have already been successful extracting device level functionalities from integrated circuit (IC) with very limited resources. Camouflaging obfuscation method that can thwart such RE. Existing work on IC camouflaging primarily involves transformable interconnects and/or covert gates where...

10.1021/acsnano.0c10651 article EN ACS Nano 2021-01-28

With an ever-increasing globalization of the semiconductor chip manufacturing supply chain coupled with soaring complexity modern-day integrated circuits (ICs), intellectual property (IP) piracy, reverse engineering, counterfeiting, and hardware trojan insertion have emerged as severe threats that compromised security critical components. Logic locking (LL) is IP protection technique can mitigate these by a given IC secret key. Earlier LL demonstrations based on traditional silicon...

10.1021/acsanm.2c02807 article EN ACS Applied Nano Materials 2022-10-04

Abstract User authentication is a critical aspect of any information exchange system which verifies the identities individuals seeking access to sensitive information. Conventionally, this approachrelies on establishing robust digital signature protocols employ asymmetric encryption techniques involving key pair consisting public and its matching private key. In article, user verification platform constructed using integrated circuits (ICs) with atomically thin two‐dimensional (2D) monolayer...

10.1002/adma.202400661 article EN cc-by Advanced Materials 2024-02-19

A true random number generator (TRNG) is essential to ensure information security for Internet of Things (IoT) edge devices. While pseudorandom generators (PRNGs) have been instrumental, their deterministic nature limits application in security-sensitive scenarios. In contrast, hardware-based TRNGs derived from physically unpredictable processes offer greater reliability. This study demonstrates a peripheral-free TRNG utilizing two cascaded three-stage inverters (TSIs) conjunction with an...

10.1021/acsnano.3c03581 article EN ACS Nano 2023-08-24

Abstract Disorder is fundamental to nature and natural phenomena, providing countless information sources, which are astronomically difficult duplicate, but have yet be exploited for cryptographic applications. While the contemporary crypto systems, relying on premise of abstract mathematical one‐way functions, relatively decipher with reasonable and/or finite resources, situation bound change advent quantum computers, necessitating physically unclonable entropy sources. As such, inspiration...

10.1002/adts.201800154 article EN Advanced Theory and Simulations 2018-12-05

Hardware Trojans (HTs) have emerged as a major security threat for integrated circuits (ICs) owing to the involvement of untrustworthy actors in globally distributed semiconductor supply chain.

10.1039/d2nh00568a article EN Nanoscale Horizons 2023-01-01

The metal-to-insulator phase transition (MIT) in two-dimensional (2D) materials under the influence of a gating electric field has revealed interesting electronic behavior and need for deeper fundamental understanding...

10.1039/d4nr03986f article EN Nanoscale 2024-12-10

Abstract Animal behavior is a complex interaction between physiology and psychology. Yet, most artificial intelligence (AI) systems do not take into account psychological factors in their decision-making. One obvious reason for this exclusion the lack of comprehensive understanding connection psychology at neuronal level. However, recent advances brain imaging molecular genetic tools have revealed that there are specific neural circuits through which hardwired regulating animal behaviors...

10.21203/rs.3.rs-2712358/v1 preprint EN cc-by Research Square (Research Square) 2023-03-31

Abstract The development of highly selective and miniaturized chemisensors for liquid media can enable newer discoveries empower a wide range disciplines from biology to human health, marine ecology climate change, industrial process monitoring food safety. While the two-terminal chemiresistor architecture has been remarkably successful in this regard, they rely on appropriate surface functionalization achieve selectivity specific target analyte. Furthermore, sensor drift sensor-to-sensor...

10.21203/rs.3.rs-2361398/v1 preprint EN cc-by Research Square (Research Square) 2023-01-09

Abstract Intrinsically ferromagnetic and semiconducting two-dimensional (2D) H-phase vanadium disulfide (VS 2 ) holds tremendous promise for future electronics, optoelectronics, spintronics valleytronics applications. However, its thermodynamic instability the formation of intermediate stoichiometric polymorphs during growth have stymied any progress towards synthesis high quality 2D VS films. In this article, we circumvent these challenges accomplish large area monolayer films using...

10.21203/rs.3.rs-2558699/v1 preprint EN cc-by Research Square (Research Square) 2023-03-21

This letter is concerned with the electrical characterization of 3D fin-shaped silicon used as a channel in novel transistor architectures. approach adapts photoconductance decay minority carrier measurement methodology to needs semiconductor materials systems. The results obtained indicate high threefold decrease lifetime Si compared same active planar prior fins definition (from τ ~ 45 μs 15 μs). A cause this significant expansion effective surface area finned samples and resulting...

10.1109/led.2017.2749205 article EN IEEE Electron Device Letters 2017-09-04

Abstract Reverse engineering (RE) is one of the major security threats to semiconductor industry due involvement untrustworthy parties in an increasingly globalized chip manufacturing supply chain [1-5]. RE efforts have already been successful extracting device level functionalities from integrated circuit (IC) with very limited resources [6]. Camouflaging obfuscation method that can thwart such [7-9]. Existing work on IC camouflaging primarily uses fabrication techniques as doping and dummy...

10.21203/rs.3.rs-81183/v1 preprint EN cc-by Research Square (Research Square) 2020-09-30
Coming Soon ...