- Advanced Malware Detection Techniques
- Parallel Computing and Optimization Techniques
- Network Security and Intrusion Detection
- Security and Verification in Computing
- EEG and Brain-Computer Interfaces
- COVID-19 epidemiological studies
- Machine Learning and Data Classification
- Neural Networks and Applications
- Sensor Technology and Measurement Systems
- Adversarial Robustness in Machine Learning
- Data Stream Mining Techniques
- Advanced Data Storage Technologies
- VLSI and Analog Circuit Testing
- Integrated Circuits and Semiconductor Failure Analysis
- Cloud Computing and Resource Management
- Face and Expression Recognition
- Embedded Systems Design Techniques
- Physical Unclonable Functions (PUFs) and Hardware Security
- Bayesian Modeling and Causal Inference
- Topic Modeling
- Recommender Systems and Techniques
- Context-Aware Activity Recognition Systems
- Phase Change Materials Research
- Fuzzy Logic and Control Systems
- Advanced Graph Neural Networks
University of California, Davis
2021-2024
University of Maryland, Baltimore County
2020
George Mason University
2014-2017
Victoria University
2005
With the growth and globalization of IC design development, there is an increase in number Designers Design houses. As setting up a fabrication facility may easily cost upwards $20 billion, costs for advanced nodes be even greater. houses that cannot produce their chips in-house have no option but to use external foundries are often other countries. Establishing trust with these can challenge, assumed untrusted. The untrusted global semiconductor supply chain has raised concerns about...
BusyBox, an open-source software bundling over 300 essential Linux commands into a single executable, is ubiquitous in Linux-based embedded devices. Vulnerabilities BusyBox can have far-reaching consequences, affecting wide array of This research, driven by the extensive use delved its analysis. The study revealed prevalence older versions real-world products, prompting us to conduct fuzz testing on BusyBox. Fuzzing, pivotal method, aims induce crashes that are subsequently scrutinized...
Direct placement of Phase Change Materials (PCMs) on the chip has been recently explored as a passive temperature management solution. PCMs provide ability to store large amounts heat at close-to-constant during phase change (solid liquid and vice versa). This latent capacity can be used higher performance while reducing hot spots. Detailed modeling behavior is essential for design evaluation systems with PCM. paper proposes an accurate model that integrated into commonly thermal simulation...
The advancement of deep neural networks (DNNs) motivates the deployment in various domains, including image classification, disease diagnoses, voice recognition, etc. Since some tasks that DNN undertakes are very sensitive, label information is confidential and contains a commercial value or critical privacy. This paper demonstrates DNNs also bring new security threat, leading to leakage input instances for models. In particular, we leverage cache-based side-channel attack (SCA), i.e.,...
In modern society, people are exposed to various stressors and negative emotions daily they may cause mental physical diseases such as depression, anxiety, high blood pressure, heart attacks, stroke. Therefore, this paper delves into the potential of wearable technologies a tool for real-time health monitoring. The advent ubiquitous sensing has ushered in an era where physiological behavioral measurements can be continuously recorded life. One significant marker is Galvanic Skin Response...
The traditional low-power embedded processors such as Atom and ARM are entering into the high-performance server market. At same time, big data analytics applications emerging dramatically changing landscape of center workloads. Emerging require a significant amount computational power. However, rapid growth in yields challenges to process them efficiently using current architectures. Furthermore, physical design constraints, power density have become dominant limiting factor for scaling out...
High fabrication cost per bit and thermal issues are the main reasons that prevent architects from using 3D-DRAM alone as memory. In this paper we address issue by proposing a heterogeneous memory system combines DDRx DRAM with an emerging 3D hybrid cube (HMC) technology. Bandwidth temperature management challenging for such architecture. To these challenges, first introduce page allocation policy to maximize performance. Then, proposed policy, propose temperature-aware algorithm adaptively...
Heterogeneous architectures have emerged as a promising solution to address the dark silicon challenge by providing customized cores for each running application. To harness power of heterogeneity, critical is simultaneously fine-tuning several parameters at application, architecture, system, well circuit levels heterogeneous that improve energy-efficiency envelope. this challenge, an ElasticCore platform described where core resources along with operating voltage and frequency settings are...
Side-channel attacks have been a constant threat to computing systems. In recent times, vulnerabilities in the architecture were discovered and exploited mount execute state-of-the-art attack such as Spectre. The Spectre exploits vulnerability Intel-based processors leak confidential data through covert channel. There exist some defenses mitigate attack. Among multiple defenses, hardware-assisted attack/intrusion detection (HID) systems received overwhelming response due its low overhead...
In the past, epidemics such as AIDS, measles, SARS, H1N1 influenza, and tuberculosis caused death of millions people around world. response, intensive research is evolving to design efficient drugs vaccines. However, studies warn that new pandemics Coronavirus (COVID-19), variants, even deadly can emerge in future. The existing epidemic confinement approaches rely on a large amount available data determine policies. Such dependencies could cause an irreversible effect before proper...
A simultaneous multithreaded (SMT) processor is capable of executing instructions from multiple threads in the same cycle. SMT fact was introduced as a complementary architecture to superscalar increase throughput processor. Recently, several computer manufacturers have their first generation architecture. permits compete simultaneously for shared resources. An example race fetch unit which critical logic responsible thread scheduling decisions. When more than hardware execution contexts are...
In the last decades, emerging and re-emerging epidemics such as AIDS, measles, SARS, HINI influenza, tuberculosis cause death to millions of people each year. response, a large intensive research is evolving for design better drugs vaccines. However, studies warn that new pandemics Coronavirus (COVID-19) even deadly can emerge in future. The existing confinement approaches rely on amount available data determine policies. Such dependencies could an irreversible effect before proper...