Books and Book Chapters
2022 IEEE Intelligent Vehicles Symposium
Zhang, Ze, Sanjay Sri Vallabh Singapuram, Qingzhao Zhang, David Ke Hong, Brandon Nguyen, Z. Morley Mao, Scott Mahlke, and Qi Alfred Chen. (2022). AVMaestro: A Centralized Policy Enforcement Framework for Safe Autonomous-driving Environments. 2022 IEEE Intelligent Vehicles Symposium (IV), pp. 1333-1339.
Proceedings of the 59th ACM/IEEE Design Automation Conference
Heddes, Mike, Igor Nunes, Tony Givargis, Alexandru Nicolau, and Alex Veidenbaum. (2022). Hyperdimensional hashing: A robust and efficient dynamic hash table. Proceedings of the 59th ACM/IEEE Design Automation Conference, pp. 907-912.
Proceedings of the 28th Annual International Conference on Mobile Computing And Networking
Hung, Hsin-Wei, Yingtong Liu, and Ardalan Amiri Sani. (2022). Sifter: protecting security-critical kernel modules in Android through attack surface reduction. Proceedings of the 28th Annual International Conference on Mobile Computing And Networking, pp. 623-635.
Proceedings of the 54th ACM Technical Symposium on Computer Science Education
Geleta, Margarita, Jiacen Xu, Manikanta Loya, Junlin Wang, Sameer Singh, Zhou Li, and Sergio Gago-Masague. (2022). Design Factors of Maestro: A Serious Game for Robust AI Education. Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 2, pp. 1318-1318.
Proceedings of the 2022 Annual Neuro-Inspired Computational Elements Conference
Stewart, Kenneth, Andreea Danielescu, Timothy Shea, and Emre Neftci. (2022). Encoding Event-Based Data With a Hybrid SNN Guided Variational Auto-encoder in Neuromorphic Hardware. Proceedings of the 2022 Annual Neuro-Inspired Computational Elements Conference, pp. 88-97.
Proceedings of the 59th ACM/IEEE Design Automation Conference
Heddes, Mike, Igor Nunes, Tony Givargis, Alexandru Nicolau, and Alex Veidenbaum. (2022). Hyperdimensional hashing: A robust and efficient dynamic hash table.” In Proceedings of the 59th ACM/IEEE Design Automation Conference, pp. 907-912.
Proceedings of the 38th Annual Computer Security Applications Conference
Zhang, Qifan, Junjie Shen, Mingtian Tan, Zhe Zhou, Zhou Li, Qi Alfred Chen, and Haipeng Zhang. (2022). Play the Imitation Game: Model Extraction Attack against Autonomous Driving Localization. In Proceedings of the 38th Annual Computer Security Applications Conference, pp. 56-70.
Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services
Liu, Yuxin, Yoshimichi Nakatsuka, Ardalan Amiri Sani, Sharad Agarwal, and Gene Tsudik. (2022). Vronicle: verifiable provenance for videos from mobile devices. Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services, pp. 196-208.
Proceedings of the 44th International Conference on Software Engineering
Hao, Yu, Hang Zhang, Guoren Li, Xingyun Du, Zhiyun Qian, and Ardalan Amiri Sani. (2022) Demystifying the dependency challenge in kernel fuzzing. In Proceedings of the 44th International Conference on Software Engineering, pp. 659-671.
Hwu, T. J., & Krichmar, J. L. Neurorobotics: Connecting the Brain, Body, and Environment
Hwu, T. J., & Krichmar, J. L. Neurorobotics: Connecting the Brain, Body, and Environment. MIT Press, 2022
Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis
Zhuowen Zou, Yeseong Kim, Farhad Imani, Haleh Alimohamadi, Rosario Cammarota, Mohsen Imani (2021). Scalable edge-based hyperdimensional learning system with brain-like neural adaptation. In Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, pp. 1-15.
Proceedings of the 2021 on Great Lakes Symposium on VLSI
Alejandro Hernández-Cano, Cheng Zhuo, Xunzhao Yin, Mohsen Imani (2021). Real-time and robust hyperdimensional classification. In Proceedings of the 2021 on Great Lakes Symposium on VLSI, pp. 397-402.
Proceedings of the 26th Asia and South Pacific Design Automation Conference
Hussam Amrouch, Xiaobo Sharon Hu, Mohsen Imani, Ann Franchesca Laguna, Michael Niemier, Simon Thomann, Xunzhao Yin, Cheng Zhuo (2021). Cross-layer design for computing-in-memory: From devices, circuits, to architectures and applications. In Proceedings of the 26th Asia and South Pacific Design Automation Conference, pp. 132-139.
Proceedings of the 26th Asia and South Pacific Design Automation Conference
Yunhui Guo, Mohsen Imani, Jaeyoung Kang, Sahand Salamat, Justin Morris, Baris Aksanli, Yeseong Kim, Tajana Rosing (2021). Hyperrec: Efficient recommender systems with hyperdimensional computing. In Proceedings of the 26th Asia and South Pacific Design Automation Conference, pp. 384-389.
Proceedings of the 26th Asia and South Pacific Design Automation Conference
Minxuan Zhou, Mohsen Imani, Yeseong Kim, Saransh Gupta, Tajana Rosing (2021). Dp-sim: A full-stack. In Proceedings of the 26th Asia and South Pacific Design Automation Conference, pp. 639-644.
Lecture Notes in Control and Information Sciences
Shoukry, Y., Tabuada, P. (2021). The Secure State Estimation Problem. In: Ferrari, R.M., Teixeira, A.M.H. (eds) Safety, Security and Privacy for Cyber-Physical Systems. Lecture Notes in Control and Information Sciences, vol 486. pp. 123-143.
Behavioral Synthesis for Hardware Security
Peter, Steffen, and Tony Givargis. (2021). Generation and Verification of Timing Attack Resilient Schedules During the High-Level Synthesis of Integrated Circuits. In Behavioral Synthesis for Hardware Security, pp. 343-363.
Proceedings of the First International Workshop on Cyber-Physical-Human System Design and Implementation
Ahadi-Sarkani, Armand, and Salma Elmalaki. (2021). Adas-rl: Adaptive vector scaling reinforcement learning for human-in-the-loop lane departure warning. Proceedings of the First International Workshop on Cyber-Physical-Human System Design and Implementation, pp. 13-18.
Proceedings of the 26th Asia and South Pacific Design Automation Conference
Givargis, Tony. “Gravity: An Artificial Neural Network Compiler for Embedded Applications. (2021). Proceedings of the 26th Asia and South Pacific Design Automation Conference, pp. 715-721.
Proceedings of the Workshop on Hot Topics in Operating Systems,
Zhang, Yiying, Ardalan Amiri Sani, and Guoqing Harry Xu. (2021). User-defined cloud. Proceedings of the Workshop on Hot Topics in Operating Systems, pp. 33-40.
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop
Chen, Alfred Qi. (2021). Towards Secure and Robust Autonomy Software in Autonomous Driving and Smart Transportation. In Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, pp. 1-1.
Proceedings of the Conference on Information Technology for Social Good
Tazarv, Ali, Sina Labbaf, Amir M. Rahmani, Nikil Dutt, and Marco Levorato. (2021). Data collection and labeling of real-time iot-enabled bio-signals in everyday settings for mental health improvement. Proceedings of the Conference on Information Technology for Social Good, pp. 186-191.
Proceedings of the International Conference on Internet-of-Things Design and Implementation
Elmalaki, Salma. (2021). Fair-iot: Fairness-aware human-in-the-loop reinforcement learning for harnessing human variability in personalized iot. Proceedings of the International Conference on Internet-of-Things Design and Implementation, pp. 119-132.
Proceedings of the 36th Annual ACM Symposium on Applied Computing
Vo, Khuong, Emad Kasaeyan Naeini, Amir Naderi, Daniel Jilani, Amir M. Rahmani, Nikil Dutt, and Hung Cao. (2021). P2E-WGAN: ECG waveform synthesis from PPG with conditional wasserstein generative adversarial networks. Proceedings of the 36th Annual ACM Symposium on Applied Computing, pp. 1030-1036.
Handbook of Research on Methodologies and Applications of Supercomputing
Donyanavard, Bryan, Amir M. Rahmani, Axel Jantsch, Onur Mutlu, and Nikil Dutt. (2021). Intelligent management of mobile systems through computational self-awareness. Handbook of Research on Methodologies and Applications of Supercomputing, pp. 41-73.
Proceedings of the 2021 ACM Workshop on Security and Privacy Analytics
Derakhshan, Ali, Ian G. Harris, and Mitra Behzadi. (2021). Detecting telephone-based social engineering attacks using scam signatures. Proceedings of the 2021 ACM Workshop on Security and Privacy Analytics, pp. 67-73.
Handbook of Research on Methodologies and Applications of Supercomputing
Donyanavard, Bryan, Amir M. Rahmani, Axel Jantsch, Onur Mutlu, and Nikil Dutt. (2021) Intelligent management of mobile systems through computational self-awareness. In Handbook of Research on Methodologies and Applications of Supercomputing, pp. 41-73. IGI Global.
Proceedings of the Conference on Information Technology for Social Good
Tazarv, Ali, Sina Labbaf, Amir M. Rahmani, Nikil Dutt, and Marco Levorato. (2021). Data collection and labeling of real-time iot-enabled bio-signals in everyday settings for mental health improvement. Proceedings of the Conference on Information Technology for Social Good, pp. 186-191.
Annual Computer Security Applications Conference
Tan, Mingtian, Zhe Zhou, and Zhou Li. (2021). The many-faced god: Attacking face verification system with embedding and image recovery. In Annual Computer Security Applications Conference, pp. 17-30.
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
Zhang, Yiming, Baojun Liu, Chaoyi Lu, Zhou Li, Haixin Duan, Jiachen Li, and Zaifeng Zhang. (2021). Rusted anchors: A national client-side view of hidden root CAs in the web PKI ecosystem. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 1373-1387.
Annual Computer Security Applications Conference
Liu, Mingxuan, Yiming Zhang, Baojun Liu, Zhou Li, Haixin Duan, and Donghong Sun. (2021). Detecting and characterizing SMS spearphishing attacks. Annual Computer Security Applications Conference, pp. 930-943.
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
Wang, Tianhao, Joann Qiongna Chen, Zhikun Zhang, Dong Su, Yueqiang Cheng, Zhou Li, Ninghui Li, and Somesh Jha. (2021). Continuous release of data streams under both centralized and local differential privacy.” In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 1237-1253.
Encyclopedia of Cryptography, Security and Privacy
Barua, A., Al Faruque, M.A. (2021). The Hall Sensor Security. In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg.
Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services
Talebi, Seyed Mohammadjavad Seyed, Ardalan Amiri Sani, Stefan Saroiu, and Alec Wolman. (2021) MegaMind: a platform for security & privacy extensions for voice assistants. Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services, pp. 109-121.
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
Xu, Fenghao, Siyu Shen, Wenrui Diao, Zhou Li, Yi Chen, Rui Li, and Kehuan Zhang. (2021). Android on pc: On the security of end-user android emulators. Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 1566-1580.
Henkel, Jörg, and Nikil Dutt. Dependable embedded systems
Henkel, Jörg, and Nikil Dutt. Dependable embedded systems. Springer Nature, December, 2020
Proceedings of the 11th ACM SIGOPS Asia-Pacific Workshop on Systems
Gongjin Sun, Sang-Woo Jun (2020). ColumnBurst: a near-storage accelerator for memory-efficient database join queries. In Proceedings of the 11th ACM SIGOPS Asia-Pacific Workshop on Systems, pp. 9-16
Memristive Devices for Brain-Inspired Computing
Fouda, Mohammed E., Fadi Kurdahi, Ahmed Eltawil, and Emre Neftci. (2020). Spiking neural networks for inference and learning: A memristor-based design perspective. Memristive Devices for Brain-Inspired Computing: 499-530.
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security
Zhang, Yiming, Baojun Liu, Chaoyi Lu, Zhou Li, Haixin Duan, Shuang Hao, Mingxuan Liu, Ying Liu, Dong Wang, and Qiang Li. (2020). Lies in the air: Characterizing fake-base-station spam ecosystem in china.” In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 521-534.
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security
Dong, Shuaike, Zhou Li, Di Tang, Jiongyi Chen, Menghan Sun, and Kehuan Zhang. (2020). Your smart home can’t keep a secret: Towards automated fingerprinting of iot traffic.” In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, pp. 47-59.