Song Huang, Di Yuan, and Anthony Ephremides
This article related to spectrum scarcity studies bandwidth partition and allocation to optimize spectrum utilitzation in cognitive communications under the interweave paradigm.
IEEE Journal of Communications & Networks
Nadee Seneviratne, Ganesh Sivaraman, Carol Espy-Wilson
This paper proposes a multi-corpus speech inversion system for automatic speech recognition, pronounciation training and speech therapy.
Carol Espy-Wilson, Adam Lammert, Nadee Seneviratne, Thomas Quatieri
A new articulary inversion process provides a potentially powerful way of detecting depression based on speech patterns.
Saurabh Sahu, Vikramjit Mitra, Nadee Seneviratne, Carol Espy-Wilson
The paper leverages multi-modal learning and automated speech recognition (ASR) systems toward building a speech-only emotion recognition model.
Zhenyu Tang, Hsien-Yu Meng, Dinesh Manocha
This paper proposes a method for generating low-frequency compensated synthetic impulse responses that improve the performance of automatic speech recognition, lowering word error rates. This method generates more realistic synthetic IRs with low-frequency compensation for far-field ASR training.
Pengfei Qiu, Dongsheng Wang, Yongqiang Lyu, Gang Qu
VoltJockey is an innovative software-controlled, hardware fault-based attack on multi-core processors that adopt dynamic voltage and frequency scaling (DVFS) techniques for energy efficiency.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
Jiliang Zhang, Gang Qu
In many Industry Internet of Things (IIoT) applications, resources like CPU, memory, and battery power are limited and cannot afford the classic cryptographic security solutions. Silicon Physical Unclonable Function (PUF) is a lightweight security primitive that exploits manufacturing variations during the chip fabrication process for key generation and/or device authentication. The paper proposes a PUF-based key sharing method for the first time.
IEEE Transactions on Industrial Electronics
Zhaojun Lu, Qian Wang, Xi Chen, Gang Qu, Yongqiang Lyu, Zhenglin Liu
Controller Area Network is standard for in-vehicle communications, but attackers can compromise to remotely control vehicles. The researchers have developed a low-cost, high-efficiency encryption and authentication protocol to improve security.
Zhaojun Lu, Zhenglin Liu, Carson Dunbar, Mingze Gao, Gang Qu
This paper on intelligent transportation systems proposes pass and run protocol for vehicular delay tolerant networks to address vehicle location privacy in communicating with roadside units.
IEEE Design & Test
Abhishek Chakraborty and Ankur Srivastava
Paper on hardware-software co-design based obfuscation of hardware accelerators proposes hardware-software co-design based obfuscation approach to render unactivated accelerator chip functionally useless.
IEEE Annual Symposium on VLSI 2019
Ankit Mondal, Ankur Srivastava
The research proposes the use of magnetic tunnel junctions as stochastic number generators in an SC-based hardware implementation of neural networks. The proposed algorithm brings about a 40% reduction in energy consumption with less than 1% accuracy loss on the 2-layer MNIST network.
ACM Journal on Emerging Technologies in Computing Systems
Abhishek Chakraborty, Nithyashankari Gummidipoondi Jayasankaran, Yuntao Liu, Jeyavijayan Rajendran, Ozgur Sinanoglu, Ankur Srivastava, Yang Xie, Muhammad Yasin, Michael Zuzak
A survey of the evolution of logic locking and a primer for researchers interested in developing novel techniques in new domains. The authors introduce various “cat and mouse” games involved in logic locking along with its novel applications—including, processor pipelines, graphics-processing units, and analog circuits.
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Baturalp Buyukates, Sennur Ulukus
Investigates the age performance of uncoded and coded computation distribution algorithms and shows that a minimum data set-coded task distribution scheme asymptotically outperforms uncoded and repetition coded schemes.
Karim Banawan, Sennur Ulukus
Explores the secure degrees of freedom of three new channel models: broadcast channel with combating helper, interference channel with selfish users, and multiple-access wiretap channel with deviating users. The paper investigates various malicious interactions that arise in networks, including active adversaries, and proves that a deviating user can drive the secure degrees of freedom to zero. However, the remaining users can exploit the intentional jamming signals as cooperative jamming signals against the eavesdropper and achieve an optimum secure degrees of freedom.