- VLSI and FPGA Design Techniques
- Cryptographic Implementations and Security
- Chaos-based Image/Signal Encryption
- Micro and Nano Robotics
- Advancements in Photolithography Techniques
- Physical Unclonable Functions (PUFs) and Hardware Security
- Advanced Manufacturing and Logistics Optimization
- Wireless Power Transfer Systems
- Reinforcement Learning in Robotics
- Evolutionary Algorithms and Applications
- VLSI and Analog Circuit Testing
- Traffic control and management
- Modular Robots and Swarm Intelligence
- Piezoelectric Actuators and Control
- Scheduling and Optimization Algorithms
- Real-Time Systems Scheduling
- Industrial Vision Systems and Defect Detection
- Electric Vehicles and Infrastructure
- Coding theory and cryptography
- Characterization and Applications of Magnetic Nanoparticles
- Vehicle emissions and performance
- Embedded Systems Design Techniques
- Data Stream Mining Techniques
Chinese Academy of Sciences
2013-2023
Institute of Intelligent Machines
2023
University of Science and Technology of China
2023
Hefei Institutes of Physical Science
2023
Fu Jen Catholic University
2006-2009
Cryptographic embedded systems are vulnerable to Differential Power Analysis (DPA) attacks. In this paper, we propose a logic design style, called as Precharge Masked Reed-Muller Logic (PMRML) overcome the glitch and Dissipation Timing Skew (DTS) problems in of DPA-resistant cryptographic hardware. Both can significantly reduce DPA-resistance. To our knowledge, DTS problem its countermeasure have not been reported. The PMRML be fully realized using common CMOS standard cell libraries....
Cryptographic embedded systems are vulnerable to differential power analysis (DPA) attacks. This paper propose a logic design style, called as pre-charge masked Reed-Muller (PMRML) overcome the glitch and dissipation timing skew (DTS) problems in of DPA-resistant cryptographic hardware. Both can significantly reduce DPA-resistance. To our knowledge, DTS problem its countermeasure have not been reported. The PMRML be fully realized using common CMOS standard cell libraries. Furthermore, it...
It is time-consuming to obtain the matched devices by manual analysis and place them in hand for analog circuits of mixed signal system. To achieve high performance, placement a key point layout design circuits. In order simplify design, it necessary realize procedure automatically. this paper, method automatic circuit provided, as well an efficient algorithm device groups. The experimental results verify
The allocation of device variables on I/O registers affects the code size and performance an driver. This work seeks with minimal software or hardware cost in a hardware/software codesign environment. problems exact minimization under constraints are formulated as zero-one integer linear programming problems. Heuristic algorithms based iterative refinement also proposed. proposed design methodology was implemented C language. Compared industrial designs, system can obtain alternatives that...
This paper presents a method of tuning the gate length and width in standard cell for reuse, which includes algorithm auto-identification, obtaining information locations and/or sizes related layout patterns. Existing layouts cells are reused to design new cells. Experimental results show that this can improve efficiency designs facilitate generation satisfying requirements physical optimization.
Magnetic microrobots (MMs) have been receiving tremendous attention due to their advantages of untethered controllability and bio-compatibility, they shown be promising tools for targeted therapy. Ahead implementations, one the most vital motion properties MMs, i.e. fundamental spin motility, should characterized better utilization. To fulfill precise characterization it is great value develop an electromagnetic field generator with high accuracy. One usually equips its coils iron cores...
Improving sample efficiency is crucial for reinforcement learning, especially the robot manipulation tasks. The model-based method could improve by introducing a dynamic model to generate large number of samples, so that requirement interaction with environment can be reduced. However, as constructed deep network, error inevitable. This will increase errors data generated model, which may damage policy training process certain extent. To overcome limitations above augmentation methods, this...
Magnetic micro/nanorobot (MM) is promising for in-body therapy due to its advantage of untethered controllability. Since the motion MMs can be directly manipulated by magnetic field (MF) created electromagnetic coil systems, it essential study MF generation control methods. In this study, iron core-based solenoids are employed in an system that produce a stronger than regular systems. However, presents hysteretic nonlinearity core's coercivity, which degrades closed-loop performances. To...
Various logic design styles have been proposed to counteract DPA (Differential Power Analysis) attacks for secure cryptographic IC design. However, only a couple of papers addressed the automatic synthesis and optimization these circuits. This paper attempts identify common issues in typical masking-based countermeasures. They include (1) constrained Reed-Muller (RM) minimization, (2) minimum decomposition multi-input AND gates (3) number mask bits used randomize power consumption. An...