- Physical Unclonable Functions (PUFs) and Hardware Security
- Advanced Memory and Neural Computing
- Sparse and Compressive Sensing Techniques
- Cryptographic Implementations and Security
- Security and Verification in Computing
- Optical Imaging and Spectroscopy Techniques
- Energy Harvesting in Wireless Networks
- Photoacoustic and Ultrasonic Imaging
- Integrated Circuits and Semiconductor Failure Analysis
- Advanced biosensing and bioanalysis techniques
- Advanced Radiotherapy Techniques
- Analog and Mixed-Signal Circuit Design
- Wireless Communication Security Techniques
- Embedded Systems Design Techniques
- Microbial Fuel Cells and Bioremediation
- Breast Cancer Treatment Studies
- Modular Robots and Swarm Intelligence
- Electrochemical sensors and biosensors
- Radiation Effects in Electronics
- Advanced Malware Detection Techniques
University of Connecticut
2014-2020
In this manuscript, we review the current progress of utilizing ultrasound-guided diffuse optical tomography (US-guided DOT) for predicting and monitoring neoadjuvant chemotherapy (NAC) outcomes breast cancer patients. We also report recent advance on systems toward portable robust clinical use at multiple sites. The first patient who has been closely monitored before NAC, day 2, 8, end three cycles surgery is given as an example to demonstrate potential US-guided DOT technique.
Memristors are considered as one promising device for implementing future memory and computing systems. However, design of memristor-based circuits faces a key challenge to deal with variations from nonideal fabrication processes the resulting performance uncertainties. Fortunately, this randomness can be exploited in many other applications, such compressive sensing-based data acquisition, which relies on random sensing matrix digital or analog formats. Existing systems usually implemented...
Memristors are considered as one promising candidate for future memory and computing fabrics. However, the design of memristor-based circuits is under a critical challenge inevitable variations due to non-ideal fabrication processes resulted performance uncertainties. This kind randomness can be utilized in many other applications, such compressive sensing based data acquisition, which conducted by random matrix. Existing systems usually implemented digital CMOS circuits, suffer problems...
In this paper, an improved diffuse optical tomography system with compact size, miniature-data-acquisition module using FPGA, and a robust probe is introduced for assessing neoadjuvant chemotherapy response at multiple hospital sites.
Microbial fuel cells (MFCs) are promising renewable energy sources for long-term underwater systems. The critical limitations of MFCs include low output voltage and bioturbation interference. A multianode MFC was proposed in our previous work to tolerate problems. Due the unique structure multi-anode MFC, an anode decoupling function is needed power management. Conventional designs based on separate charge pumps will have large overhead performance degradation when anodes impaired. In this...
Image sensor is a commonly used electronic device in various applications. With the increasing requirement for resolution and frame rates, power consumption getting significant, which limits use of image sensors mobile sand IoT Compressive sensing (CS) techniques can achieve sub-Nyquist sampling rate to reduce hardware circuits. Currently, most compressive measurements are implemented digital CMOS circuits, leading high complexity as well limited speed. These drawbacks cannot support rapid...
Scan chains, as the most common design-fortestability (DFT) technique, provide a powerful way for structural testing of integrated circuits (ICs). However, they can be easily exploited by unauthorized parties to acquire critical design information. Scan-based attacks are one kind side-channel attack that reveals comprehensive information IC chips. Reports have shown many successful scan-based against mainstream cryptographic systems, such Rivest-Shamir- Adleman (RSA), Advanced Encryption...
Insertion of scan chains, as the most common DFT technique, provides a powerful way for structural testing integrated circuits (IC). However, it can be easily misused by unauthorized parties to acquire critical design information. Scan-based attacks are one kind side channel that reveal comprehensive information IC noninvasively. Reports have shown many successful based against main stream cryptographic systems, such RSA, AES, etc. On other hand, current countermeasure schemes limited either...
Image sensors are widely used in various applications. With the increasing requirement for high resolutions and frame rates, power consumption has become a critical issue, which limits use of image mobile devices IoT Compressive sensing (CS) techniques can achieve sub-Nyquist sampling rate to reduce hardware circuits. Currently, most compressive measurements implemented digital CMOS circuits, leading complexity consumption, as well limited speed. Furthermore, CS applications with large sizes...
Various design techniques can be applied to implement the finite state machine (FSM) functions in order optimize timing, performance, power, and reduce overhead. Recently, malicious attacks hardware systems have emerged as a critical problem. Fault injection attacks, particular, alter function or reveal information of system through precisely controlled fault processes. Attackers utilize loopholes vulnerabilities FSM access states that are under protection. A probabilistic model is developed...
Field Programmable Gate Arrays (FPGA), as one of the popular circuit implementation platforms, provide flexible and powerful way for different applications. IC designs are configured to FPGA through bitstream files. However, configuration process can be hacked by side channel attacks (SCA) acquire critical design information, even under protection encryptions. Reports have shown many successful against cryptographic systems during loading entire design. Current countermeasures, mostly random...