Follow

Submissions from 2017

Link

Fault Diagnosis Schemes for Low-Energy Block Cipher Midori Benchmarked on FPGA, Anita Aghaie, Mehran Mozaffari Kermani, and Reza Azarderakhsh

Link

Lightweight Architectures for Reliable and Fault Detection Simon and Speck Cryptographic Algorithms on FPGA, Prashant Ahir, Mehran Mozaffari Kermani, and Reza Azarderakhsh

Link

FPGA Realization of Low Register Systolic All-One-Polynomial Multipliers Over GF(2m) and Their Applications in Trinomial Multipliers, Pingxiuqi Chen, Shaik Nazeem Basha, and Mehran Mozaffari Kermani

Link

Efficient Implementation of Supersingular Isogeny-Based Diffie-Hellman Key Exchange on ARM, Amir Jalali, Reza Azarderakhsh, and Mehran Mozaffari Kermani

Link

Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves, Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani, and David Jao

Link

Fault Detection Architectures for Post-Quantum Cryptographic Stateless Hash-Based Secure Signatures Benchmarked on ASIC, Mehran Mozaffari Kermani, Reza Azarderakhsh, and Anita Aghaie

Link

Reliable Low-Latency Viterbi Algorithm Architectures Benchmarked on ASIC and FPGA, Mehran Mozaffari Kermani, Vineeta Singh, and Reza Azarderakhsh

Link

Reliable Hardware Architectures of the CORDIC Algorithm With a Fixed Angle of Rotations, Rajkuma Ramadoss, Mehran Mozaffari Kermani, and Reza Azarderakhsh

Link

Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT, Srivatsan Subramanian, Mehran Mozaffari Kermani, Reza Azarderakhsh, and Mehrdad Nojoumian

PDF

Systems and methods for planning a robot grasp that can withstand task disturbances, Yu Sun and Yun Lin

PDF

Systems and methods for providing augmented reality in minimally invasive surgery, Yu Sun, Janie E. Sanchez, Xiaoning Qian, and Bingxiong Lin

Submissions from 2016

Link

Fault Diagnosis Schemes for Secure Lightweight Cryptographic Block Cipher RECTANGLE Benchmarked on FPGA, Anita Aghaie, Mehran Mozaffari Kermani, and Reza Azarderakhsh

Link

Recent Data Sets on Object Manipulation: A Survey, Yongqiang Huang, Matteo Bianchi, Minas Liarokapis, and Yu Sun

Link

On Fast Calculation of Addition Chains for Isogeny-Based Cryptography, Brian Koziel, Reza Azarderakhsh, David Jao, and Mehran Mozaffari Kermani

Link

Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA, Brian Koziel, Reza Azarderakhsh, and Mehran Mozaffari Kermani

Link

NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key Exchange Protocol on ARM, Brian Koziel, Amir Jalali, Reza Azarderakhsh, David Jao, and Mehran Mozaffari Kermani

Link

Video-Based 3D Reconstruction, Laparoscope Localization and Deformation Recovery for Abdominal Minimally Invasive Surgery: A Survey, Bingxiong Lin, Yu Sun, Xiaoning Qian, Dmitry Goldgof, Richard D. Gitlin, and Yuncheng You

Link

Task-Oriented Grasp Planning Based on Disturbance Distribution, Yun Lin and Yu Sun

Link

Lightweight Hardware Architectures for Fault Diagnosis Schemes of Efficiently-Maskable Cryptographic Substitution Boxes, Mehran Mozaffari Kermani and Reza Azarderakhsh

Link

Multidisciplinary Approaches and Challenges in Integrating Emerging Medical Devices Security Research and Education, Mehran Mozaffari Kermani, Reza Azarderakhsh, and Mehdi Mirakhorli

Link

Error Detection Reliable Architectures of Camellia Block Cipher Applicable to Different Variants of Its Substitution Boxes, Mehran Mozaffari Kermani, Reza Azarderakhsh, and Jiafeng Xie

Link

Efficient Error Detection Architectures for CORDIC through Recomputing with Encoded Operands, Mehran Mozaffari Kermani, Rajkuma Ramadoss, and Reza Azarderakhsh

PDF

Systems and methods for projecting images onto an object, Yu Sun and Adrian S. Johnson

PDF

Systems and methods for planning a robot grasp based upon a demonstrated grasp, Yu Sun and Yun Lin

Submissions from 2015

Link

High-Performance Two-Dimensional Finite Field Multiplication and Exponentiation for Cryptographic Applications, Reza Azarderakhsh and Mehran Mozaffari Kermani

Link

Systolic Gaussian Normal Basis Multiplier Architectures Suitable for High-Performance Applications, Reza Azarderakhsh, Mehran Mozaffari Kermani, Siavash Bayat-Sarmadi, and Chiou-Yng Lee

Link

Secure and Efficient Architectures for Single Exponentiations in Finite Fields Suitable for High-Performance Cryptographic Applications, Reza Azarderakhsh, Mehran Mozaffari Kermani, and Kimmo Järvinen

Link

Generalized Parallel CRC Computation on FPGA, Christopher E. Kennedy and Mehran Mozaffari Kermani

Link

Low-Resource and Fast Binary Edwards Curves Cryptography, Brian Koziel, Reza Azarderakhsh, and Mehran Mozaffari Kermani

Link

Grasp Planning to Maximize Task Coverage, Yun Lin and Yu Sun

Link

Energy-Efficient Long-term Continuous Personal Health Monitoring, Arsalan Mohsen Nia, Mehran Mozaffari Kermani, Susmita Sur-Kolay, Anand Raghunathan, and Niraj K. Jha

Link

Integrating Emerging Cryptographic Engineering Research and Security Education, Mehran Mozaffari Kermani and Reza Azarderakhsh

Link

Reliable Hash Trees for Post-Quantum Stateless Cryptographic Hash-Based Signatures, Mehran Mozaffari Kermani and Reza Azarderakhsh

Link

Reliable and Error Detection Architectures of Pomaranch for False-Alarm-Sensitive Cryptographic Applications, Mehran Mozaffari Kermani, Reza Azarderakhsh, and Anita Aghaie

Link

Reliable Radix-4 Complex Division for Fault-Sensitive Applications, Mehran Mozaffari Kermani, Niranjan Manoharan, and Reza Azarderakhsh

Link

Systematic Poisoning Attacks on and Defenses for Machine Learning in Healthcare, Mehran Mozaffari Kermani, Susmita Sur-Kolay, Anand Raghunathan, and Niraj K. Jha

Link

New Development in Robot Vision, Yu Sun, Aman Behal, and Chi-Kit Ronald Chung

Link

Modeling Paired Objects and Their Interaction, Yu Sun and Yun Lin

Submissions from 2014

Link

Efficient Algorithm and Architecture for Elliptic Curve Cryptography for Extremely Constrained Secure Applications, Reza Azarderakhsh, Kimmo U. Järvinen, and Mehran Mozaffari Kermani

Link

Dual-Basis Superserial Multipliers for Secure Applications and Lightweight Cryptographic Architectures, Siavash Bayat-Sarmadi, Mehran Mozaffari Kermani, Reza Azarderakhsh, and Chiou-Yng Lee

Link

Efficient and Concurrent Reliable Realization of the Secure Cryptographic SHA-3 Algorithm, Siavash Bayat-Sarmadi, Mehran Mozaffari Kermani, and Arash Reyhani-Masoleh

Link

Spatial Augmented Reality as a Method for a Mobile Robot to Communicate Intended Movement, Michael D. Coovert, Tiffany Lee, Ivan Shindev, and Yu Sun

Link

Efficient Vessel Feature Detection for Endoscopic Image Analysis, Bingxiong Lin, Yu Sun, Jaime E. Sanchez, and Xiaoning Qian

Link

Robot Grasp Planning Based on Demonstrated Grasp Strategies, Yun Lin and Yu Sun

PDF

Supervised Categorical Principal Component Analysis for Genome-Wide Association Analyses, Meng Lu, Hye-Seung Lee, David Hadley, Jianhua Z. Huang, and Xiaoning Qiao

Link

Reliable Concurrent Error Detection Architectures for Extended Euclidean-Based Division Over GF(2m), Mehran Mozaffari Kermani, Reza Azarderakhsh, Chiou-Yng Lee, and Siavash Bayat-Sarmadi

Link

Fault-Resilient Lightweight Cryptographic Block Ciphers for Secure Embedded Systems, Mehran Mozaffari Kermani, Kai Tian, Reza Azarderakhsh, and Siavash Bayat-Sarmadi

Link

Low-Latency Digit-Serial Systolic Double Basis Multiplier over GF(2m) Using Subquadratic Toeplitz Matrix-Vector Product Approach, Jeng-Shyang Pan, Reza Azarderakhsh, Mehran Mozaffari Kermani, Chiou-Yng Lee, Wen-Yo Lee, Che Wun Chiou, and Jim-Min Lin

PDF

Survey on Fall Detection and Fall Prevention Using Wearable and External Sensors, Yueng Santiago Delahoz and Miguel Angel Labrador

PDF

Fingertip force, location, and orientation sensor, Yu Sun

Link

Object–Object Interaction Affordance Learning, Yu Sun, Shaogang Ren, and Yun Lin

PDF

Joint Clustering of Protein Interaction Networks Through Markov Random Walk, Yijie Wang and Xiaoning Qian

Submissions from 2013

Link

Virtually Transparent Epidermal Imagery (VTEI): On New Approaches to In Vivo Wireless High-Definition Video and Image Processing, Adam Anderson, Bingxiong Lin, and Yu Sun

Link

A Wireless Robot for Networked Laparoscopy, Cristian A, Castro; Adham Alqassis; Sara Smith; Thomas P. Ketterl; Yu Sun; Sharona Ross; Alexander Rosemurgy; Peter P. Savage; and Richard D. Gitlin

Link

Spatial Augmented Reality on Person: Exploring the Most Personal Medium, Adrian Johnson and Yu Sun

Link

Simultaneous Tracking, 3D Reconstruction and Deforming Point Detection for Stereoscope Guided Surgery, Bingxiong Lin, Adrian Johnson, Xiaoning Qian, Jaime Sanchez, and Yu Sun

Link

Dense Surface Reconstruction With Shadows in MIS, Bingxiong Lin, Yu Sun, and Xiaoning Qian

Link

Efficient Fault Diagnosis Schemes for Reliable Lightweight Cryptographic ISO/IEC Standard CLEFIA Benchmarked on ASIC and FPGA, Mehran Mozaffari Kermani and Reza Azarderakhsh

Link

Emerging Frontiers in Embedded Security, Mehran Mozaffari Kermani, Meng Zhang, Anand Raghunathan, and Niraj K. Jha

PDF

See-through abdomen display for minimally invasive surgery, Yu Sun, Richard D. Gitlin, Adam Anderson, Alexander Rosemurgy, and Sharona Ross

Link

Energy-Efficient and Secure Sensor Data Transmission Using Encompression, Meng Zhang, Mehran Mozaffari Kermani, Anand Raghunathan, and Niraj K. Jha

Submissions from 2012

Link

MARVEL In Vivo Wireless Video System, Adham Alqassis, Thomas P. Ketterl, Cristian A. Castro, Richard D. Gitlin, S. Ross, Yu Sun, and Alexander Rosemurgy

Link

Efficient and High-Performance Parallel Hardware Architectures for the AES-GCM, Mehran Mozaffari Kermani and Arash Reyhani-Masoleh

Submissions from 2010

Link

Vision-guided Robot System for Picking Objects by Casting Shadows, Amit Agrawal, Yu Sun, John Barnwell, and Ramesh Raskar

Link

Concurrent Structure-Independent Fault Detection Schemes for the Advanced Encryption Standard, Mehran Mozaffari Kermani and Arash Reyhani-Masoleh

Submissions from 2009

Link

A Low-Cost S-Box for the Advanced Encryption Standard Using Normal Basis, Mehran Mozaffari Kermani and Arash Reyhani-Masoleh

Link

Fault Detection Structures of the S-boxes and the Inverse S-boxes for the Advanced Encryption Standard, Mehran Mozaffari Kermani and Arash Reyhani-Masoleh

Link

Estimation of Fingertip Force Direction With Computer Vision, Yu Sun, John Hollerbach, and Stephen Mascaro

Submissions from 2008

Link

A Lightweight Concurrent Fault Detection Scheme for the AES S-Boxes Using Normal Basis, Mehran Mozaffari Kermani and Arash Reyhani-Masoleh

Link

Predicting Fingertip Forces by Imaging Coloration Changes in the Fingernail and Surrounding Skin, Yu Sun, John Hollerbach, and Stephen Mascaro

Submissions from 2007

Link

A Structure-independent Approach for Fault Detection Hardware Implementations of the Advanced Encryption Standard, Mehran Mozaffari Kermani and Arash Reyhani-Masoleh

Submissions from 2006

Link

Parity-Based Fault Detection Architecture of S-box for Advanced Encryption Standard, Mehran Mozaffari Kermani and Arash Reyhani-Masoleh

Link

Parity Prediction of S-Box for AES, Mehran Mozaffari Kermani and Arash Reyhani-Masoleh