Context-Aware Intelligence in Resource-Constrained IoT Nodes: Opportunities and Challenges
暂无分享,去创建一个
Baibhab Chatterjee | Shreyas Sen | Ningyuan Cao | Arijit Raychowdhury | A. Raychowdhury | Shreyas Sen | Baibhab Chatterjee | N. Cao
[1] Li Li,et al. A Low-Power Adaptive Receiver Utilizing Discrete-Time Spectrum-Sensing , 2013, IEEE Transactions on Microwave Theory and Techniques.
[2] Arijit Raychowdhury,et al. All-Digital Low-Dropout Regulator With Adaptive Control and Reduced Dynamic Stability for Digital Load Circuits , 2016, IEEE Transactions on Power Electronics.
[3] Amir Moradi,et al. Hardware Masking, Revisited , 2018, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[4] Jinjun Chen,et al. Threats to Networking Cloud and Edge Datacenters in the Internet of Things , 2016, IEEE Cloud Computing.
[5] Shreyas Sen. Channel-adaptive zero-margin & process-adaptive self-healing communication circuits/systems: Special session paper , 2014, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[6] Arijit Raychowdhury,et al. Switched-Mode-Control Based Hybrid LDO for Fine-Grain Power Management of Digital Load Circuits , 2018, IEEE Journal of Solid-State Circuits.
[7] Srinivas Devadas,et al. Reliable and efficient PUF-based key generation using pattern matching , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[8] Jadwiga Indulska,et al. Developing context-aware pervasive computing applications: Models and approach , 2006, Pervasive Mob. Comput..
[9] Debayan Das,et al. RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning , 2018, IEEE Internet of Things Journal.
[10] Colin Camerer,et al. A Cognitive Hierarchy Model of Games , 2004 .
[11] O. Saeed,et al. Towards Internet of Things: Survey and Future Vision , 2013 .
[12] Shreyas Sen,et al. High efficiency power side-channel attack immunity using noise injection in attenuated signature domain , 2017, 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[13] Margaret Martonosi,et al. Data compression algorithms for energy-constrained devices in delay tolerant networks , 2006, SenSys '06.
[14] Andrew W. Moore,et al. Reinforcement Learning: A Survey , 1996, J. Artif. Intell. Res..
[15] Arnab Raha,et al. D-PUF , 2017, ACM Trans. Embed. Comput. Syst..
[16] Zhenzhen Liu,et al. RL-MAC: A QoS-Aware Reinforcement Learning based MAC Protocol for Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Networking, Sensing and Control.
[17] Debayan Das,et al. Enabling Covert Body Area Network using Electro-Quasistatic Human Body Communication , 2019, Scientific Reports.
[18] Arkady B. Zaslavsky,et al. Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[19] Anupam Agrawal,et al. Vision based hand gesture recognition for human computer interaction: a survey , 2012, Artificial Intelligence Review.
[20] Weiming Shen,et al. Collaborative wireless sensor networks: A survey , 2011, 2011 IEEE International Conference on Systems, Man, and Cybernetics.
[21] Lei Chen,et al. In-network Outlier Cleaning for Data Collection in Sensor Networks , 2006, CleanDB.
[22] Ramjee Prasad,et al. Proposed embedded security framework for Internet of Things (IoT) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).
[23] Lin Li,et al. Research on PKI-like Protocol for the Internet of Things , 2013, 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation.
[24] Joseph Kennedy,et al. 26.4 A 25.6Gb/s differential and DDR4/GDDR5 dual-mode transmitter with digital clock calibration in 22nm CMOS , 2014, 2014 IEEE International Solid-State Circuits Conference Digest of Technical Papers (ISSCC).
[25] Dimitrios Gunopulos,et al. Distributed deviation detection in sensor networks , 2003, SGMD.
[26] Asad A. Abidi,et al. Adaptive analog IF signal processor for a wide-band CMOS wireless receiver , 2001 .
[27] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[28] Aurangozeb,et al. Channel adaptive ADC and TDC for 28 Gb/s PAM-4 digital receiver , 2017, 2017 IEEE Custom Integrated Circuits Conference (CICC).
[29] Shreyas Sen,et al. Secure Human-Internet using dynamic Human Body Communication , 2017, 2017 IEEE/ACM International Symposium on Low Power Electronics and Design (ISLPED).
[30] Daniel E. Holcomb,et al. Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags , 2007 .
[31] Sameer R. Sonkusale,et al. An Adaptive Resolution Asynchronous ADC Architecture for Data Compression in Energy Constrained Sensing Applications , 2011, IEEE Transactions on Circuits and Systems I: Regular Papers.
[32] John N. Tsitsiklis,et al. On Learning With Finite Memory , 2012, IEEE Transactions on Information Theory.
[33] Enrico Magli,et al. Low-complexity video compression for wireless sensor networks , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[34] Saurabh Bagchi,et al. TRIFECTA: Security, Energy Efficiency, and Communication Capacity Comparison for Wireless IoT Devices , 2017, IEEE Internet Computing.
[35] Abhijit Chatterjee,et al. A Power-Scalable Channel-Adaptive Wireless Receiver Based on Built-In Orthogonally Tunable LNA , 2012, IEEE Transactions on Circuits and Systems I: Regular Papers.
[36] Arijit Raychowdhury,et al. 5.6 A 0.13μm fully digital low-dropout regulator with adaptive control and reduced dynamic stability for ultra-wide dynamic range , 2015, 2015 IEEE International Solid-State Circuits Conference - (ISSCC) Digest of Technical Papers.
[37] Christos Faloutsos,et al. LOCI: fast outlier detection using the local correlation integral , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).
[38] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[39] Mitali Singh,et al. A Hierarchical Model For Distributed Collaborative Computation In Wireless Sensor Networks , 2004, Int. J. Found. Comput. Sci..
[40] Min Chen,et al. A Survey on Internet of Things From Industrial Market Perspective , 2015, IEEE Access.
[41] M. Prasanth,et al. Encryption and hash based security in Internet of Things , 2015, 2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN).
[42] Moshe Kam,et al. Toward an Automatic, Online Behavioral Malware Classification System , 2013, 2013 IEEE 7th International Conference on Self-Adaptive and Self-Organizing Systems.
[43] Yuh-Jye Lee,et al. Anomaly Detection via Online Oversampling Principal Component Analysis , 2013, IEEE Transactions on Knowledge and Data Engineering.
[44] Niraj K. Jha,et al. A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.
[45] Abhijit Chatterjee,et al. Multidimensional Adaptive Power Management for Low-Power Operation of Wireless Devices , 2008, IEEE Transactions on Circuits and Systems II: Express Briefs.
[46] Jörg Widmer,et al. Data Acquisition through Joint Compressive Sensing and Principal Component Analysis , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[47] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[48] Fagen Li,et al. Practical Secure Communication for Integrating Wireless Sensor Networks Into the Internet of Things , 2013, IEEE Sensors Journal.
[49] Sarmad Ullah Khan,et al. Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.
[50] R. Matthew Kretchmar,et al. Reinforcement Learning Algorithms for Homogenous Multi-Agent Systems , 2003 .
[51] Monodeep Kar,et al. Reducing Power Side-Channel Information Leakage of AES Engines Using Fully Integrated Inductive Voltage Regulator , 2018, IEEE Journal of Solid-State Circuits.
[52] Walid Saad,et al. Learning with finite memory for machine type communication , 2016, 2016 Annual Conference on Information Science and Systems (CISS).
[53] Dipankar Dasgupta,et al. Classification of Insider Threat Detection Techniques , 2016, CISRC.
[54] Shreyas Sen,et al. Invited: Context-aware energy-efficient communication for IoT sensor nodes , 2016, 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[55] Nirvana Meratnia,et al. Outlier Detection Techniques for Wireless Sensor Networks: A Survey , 2008, IEEE Communications Surveys & Tutorials.
[56] Koichiro Tanaka,et al. A fully integrated 60GHz CMOS transceiver chipset based on WiGig/IEEE802.11ad with built-in self calibration for mobile applications , 2013, 2013 IEEE International Solid-State Circuits Conference Digest of Technical Papers.
[57] R. Michael Buehrer,et al. Collaborative Sensor Network Localization: Algorithms and Practical Issues , 2018, Proceedings of the IEEE.
[58] Monodeep Kar,et al. Improved Power/EM Side-Channel Attack Resistance of 128-Bit AES Engines With Random Fast Voltage Dithering , 2019, IEEE Journal of Solid-State Circuits.
[59] Smruti R. Sarangi,et al. Internet of Things: Architectures, Protocols, and Applications , 2017, J. Electr. Comput. Eng..
[60] Shreyas Sen,et al. Self-Optimizing IoT Wireless Video Sensor Node With In-Situ Data Analytics and Context-Driven Energy-Aware Real-Time Adaptation , 2017, IEEE Transactions on Circuits and Systems I: Regular Papers.
[61] M. Palaniswami,et al. Distributed Anomaly Detection in Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.
[62] Arijit Raychowdhury,et al. A 65nm compressive-sensing time-based ADC with embedded classification and INL-aware training for arrhythmia detection , 2017, 2017 IEEE Biomedical Circuits and Systems Conference (BioCAS).
[63] Richard S. Sutton,et al. Introduction to Reinforcement Learning , 1998 .
[64] Jan M. Rabaey,et al. Data funneling: routing with aggregation and compression for wireless sensor networks , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[65] Shreyas Sen,et al. A 6.3pJ/b 30Mbps −30dB SIR-tolerant broadband interference-robust human body communication transceiver using time domain signal-interference separation , 2018, 2018 IEEE Custom Integrated Circuits Conference (CICC).
[66] Peter R. Kinget,et al. Field-Programmable LNAs With Interferer-Reflecting Loop for Input Linearity Enhancement , 2015, IEEE Journal of Solid-State Circuits.
[67] Arijit Raychowdhury,et al. In-sensor analytics and energy-aware self-optimization in a wireless sensor node , 2017, 2017 IEEE MTT-S International Microwave Symposium (IMS).
[68] Naveen Verma,et al. 18.4 A matrix-multiplying ADC implementing a machine-learning classifier directly with data conversion , 2015, 2015 IEEE International Solid-State Circuits Conference - (ISSCC) Digest of Technical Papers.
[69] Krste Asanovic,et al. Energy Aware Lossless Data Compression , 2003, MobiSys.
[70] R. Baraniuk,et al. Compressive Radar Imaging , 2007, 2007 IEEE Radar Conference.
[71] Adi Shamir,et al. Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities , 2019, Journal of Cryptology.
[72] Abhijit Chatterjee,et al. Process-Variation Tolerant Channel-Adaptive Virtually Zero-Margin Low-Power Wireless Receiver Systems , 2014, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[73] Li Lin,et al. 20.5 A 40nm dual-band 3-stream 802.11a/b/g/n/ac MIMO WLAN SoC with 1.1Gb/s over-the-air throughput , 2014, 2014 IEEE International Solid-State Circuits Conference Digest of Technical Papers (ISSCC).
[74] Gregory D. Abowd,et al. A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications , 2001, Hum. Comput. Interact..
[75] Maninder Singh,et al. A Survey on Zero-Day Polymorphic Worm Detection Techniques , 2014, IEEE Communications Surveys & Tutorials.
[76] Andrea J. Goldsmith,et al. Adaptive coded modulation for fading channels , 1998, IEEE Trans. Commun..
[77] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[78] Arijit Raychowdhury,et al. A Light-powered, "Always-On", Smart Camera with Compressed Domain Gesture Detection , 2016, ISLPED.
[79] Abhijit Chatterjee,et al. Orthogonally tunable inductorless RF LNA for adaptive wireless systems , 2011, 2011 IEEE International Symposium of Circuits and Systems (ISCAS).
[80] Kevin Ashton,et al. That ‘Internet of Things’ Thing , 1999 .
[81] Arijit Raychowdhury,et al. A Light-Powered Smart Camera With Compressed Domain Gesture Detection , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[82] Saad B. Qaisar,et al. One-class support vector machines: analysis of outlier detection for wireless sensor networks in harsh environments , 2013, Artificial Intelligence Review.
[83] Ramesh Karri,et al. Optimal checkpointing for secure intermittently-powered IoT devices , 2017, 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[84] Bill N. Schilit,et al. Disseminating active map information to mobile hosts , 1994, IEEE Network.
[85] Alex Biryukov,et al. Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds , 2010, IACR Cryptol. ePrint Arch..
[86] Walid Saad,et al. Regret Based Learning for UAV Assisted LTE-U/WiFi Public Safety Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[87] Emmanuel J. Candès,et al. Decoding by linear programming , 2005, IEEE Transactions on Information Theory.
[88] Marcelo Luis Errecalde,et al. A parallel implementation of Q-learning based on communication with cache , 2002 .
[89] Ying Su,et al. A Digital 1.6 pJ/bit Chip Identification Circuit Using Process Variations , 2008, IEEE Journal of Solid-State Circuits.
[90] Peter J. Brown,et al. The Stick-e Document: a Framework for Creating Context-aware Applications , 1996 .
[91] José López Vicario,et al. Data Aggregation and Principal Component Analysis in WSNs , 2016, IEEE Transactions on Wireless Communications.
[92] Charles H. Bennett,et al. Notes on Landauer's Principle, Reversible Computation, and Maxwell's Demon , 2002, physics/0210005.
[93] Ulrich Rührmair,et al. PUFs in Security Protocols: Attack Models and Security Evaluations , 2013, 2013 IEEE Symposium on Security and Privacy.
[94] Qazi Mamoon Ashraf,et al. Autonomic schemes for threat mitigation in Internet of Things , 2015, J. Netw. Comput. Appl..
[95] Xiuzhen Cheng,et al. Localized Outlying and Boundary Data Detection in Sensor Networks , 2007 .
[96] Yong Guan,et al. Lightweight Mutual Authentication and Ownership Transfer for RFID Systems , 2010, 2010 Proceedings IEEE INFOCOM.
[97] A.J. Johansson. Performance of a radio link between a base station and a medical implant utilising the MICS standard , 2004, The 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[98] Abhijit Chatterjee,et al. Self-learning MIMO-RF receiver systems: Process resilient real-time adaptation to channel conditions for low power operation , 2014, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[99] Kannan Ramchandran,et al. Distributed compression in a dense microsensor network , 2002, IEEE Signal Process. Mag..
[100] Mauro Conti,et al. A Survey of Man In The Middle Attacks , 2016, IEEE Communications Surveys & Tutorials.
[101] Vic Barnett,et al. Outliers in Statistical Data , 1980 .
[102] Abhijit Chatterjee,et al. Pro-VIZOR: Process tunable virtually zero margin low power adaptive RF for wireless systems , 2008, 2008 45th ACM/IEEE Design Automation Conference.
[103] S.Iswarya,et al. Biophysical Modeling, Characterization and Optimization of Electro-Quasistatic Human Body Communication , 2019 .
[104] Shreyas Sen,et al. Characterization and Classification of Human Body Channel as a function of Excitation and Termination Modalities , 2018, 2018 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).
[105] D. Janakiram,et al. Outlier Detection in Wireless Sensor Networks using Bayesian Belief Networks , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.
[106] Abhijit Chatterjee,et al. Environment-Adaptive Concurrent Companding and Bias Control for Efficient Power-Amplifier Operation , 2011, IEEE Transactions on Circuits and Systems I: Regular Papers.
[107] Shreyas Sen,et al. STELLAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-cause Analysis , 2019, 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[108] Miao Yun,et al. Research on the architecture and key technology of Internet of Things (IoT) applied on smart grid , 2010, 2010 International Conference on Advances in Energy Engineering.
[109] Abhijit Chatterjee,et al. Self-Learning RF Receiver Systems: Process Aware Real-Time Adaptation to Channel Conditions for Low Power Operation , 2017, IEEE Transactions on Circuits and Systems I: Regular Papers.
[110] Daniel E. Holcomb,et al. Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers , 2009, IEEE Transactions on Computers.
[111] Shreyas Sen,et al. SocialHBC: Social Networking and Secure Authentication using Interference-Robust Human Body Communication , 2016, ISLPED.
[112] I. Akyildiz. WIRELESS MULTIMEDIA SENSOR NETWORKS : A SURVEY The uthors discusse , .
[113] David Garlan,et al. Project Aura: Toward Distraction-Free Pervasive Computing , 2002, IEEE Pervasive Comput..
[114] Sadie Creese,et al. Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things , 2015, 2015 International Workshop on Secure Internet of Things (SIoT).
[115] Ting Sun,et al. Single-pixel imaging via compressive sampling , 2008, IEEE Signal Process. Mag..
[116] Byung-Seo Kim,et al. IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey , 2018, Sensors.
[117] Arijit Raychowdhury,et al. Integrated power management in IoT devices under wide dynamic ranges of operation , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[118] Symeon Papavassiliou,et al. Hierarchical Anomaly Detection in Distributed Large-Scale Sensor Networks , 2006, 11th IEEE Symposium on Computers and Communications (ISCC'06).
[119] Gregory D. Abowd,et al. Towards a Better Understanding of Context and Context-Awareness , 1999, HUC.
[120] Man-Kay Law,et al. A 0.45 V 147–375 nW ECG Compression Processor With Wavelet Shrinkage and Adaptive Temporal Decimation Architectures , 2017, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[121] Hamid R. Rabiee,et al. Reducing the data transmission in Wireless Sensor Networks using the Principal Component Analysis , 2010, 2010 Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processing.
[122] Abhijit Chatterjee,et al. Real-time use-aware adaptive MIMO RF receiver systems for energy efficiency under BER constraints , 2013, 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC).
[123] Kaushik Roy,et al. Exploiting Inherent Error Resiliency of Deep Neural Networks to Achieve Extreme Energy Efficiency Through Mixed-Signal Neurons , 2019, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[124] David Brumley,et al. Remote timing attacks are practical , 2003, Comput. Networks.
[125] Joseph Kennedy,et al. 26.2 A 205mW 32Gb/s 3-Tap FFE/6-tap DFE bidirectional serial link in 22nm CMOS , 2014, 2014 IEEE International Solid-State Circuits Conference Digest of Technical Papers (ISSCC).
[126] Arijit Raychowdhury,et al. Smart Sensing for HVAC Control: Collaborative Intelligence in Optical and IR Cameras , 2018, IEEE Transactions on Industrial Electronics.
[127] Srinivas Devadas,et al. Modeling attacks on physical unclonable functions , 2010, CCS '10.
[128] Jingcheng Wang,et al. A novel mutual authentication scheme for Internet of Things , 2011, Proceedings of 2011 International Conference on Modelling, Identification and Control.
[129] Ran Wolff,et al. In-Network Outlier Detection in Wireless Sensor Networks , 2006, ICDCS.
[130] Krishnamurthy Soumyanath,et al. A 28mW Spectrum-Sensing Reconfigurable 20MHz 72dB-SNR 70dB-SNDR DT ΔΣ ADC for 802.11n/WiMAX Receivers , 2008, 2008 IEEE International Solid-State Circuits Conference - Digest of Technical Papers.
[131] Marimuthu Palaniswami,et al. Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[132] David L Donoho,et al. Compressed sensing , 2006, IEEE Transactions on Information Theory.
[133] Herbert A. Simon,et al. Applications of machine learning and rule induction , 1995, CACM.
[134] Srivaths Ravi,et al. Security in embedded systems: Design challenges , 2004, TECS.
[135] Abhishek Srivastava,et al. Bio-WiTel: A Low Power Integrated Wireless Telemetry System for Healthcare Applications in 401-406 MHz Band of MedRadio Spectrum. , 2016, IEEE journal of biomedical and health informatics.
[136] H.T. Friis,et al. A Note on a Simple Transmission Formula , 1946, Proceedings of the IRE.
[137] Abhijit Chatterjee,et al. Real-Time Use-Aware Adaptive RF Transceiver Systems for Energy Efficiency Under BER Constraints , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[138] Arijit Raychowdhury,et al. A 55nm time-domain mixed-signal neuromorphic accelerator with stochastic synapses and embedded reinforcement learning for autonomous micro-robots , 2018, 2018 IEEE International Solid - State Circuits Conference - (ISSCC).
[139] Marian Verhelst,et al. Flexible and Self-Adaptive Sense-and-Compress for Sub-MicroWatt Always-on Sensory Recording , 2018, ESSCIRC 2018 - IEEE 44th European Solid State Circuits Conference (ESSCIRC).
[140] Lovekesh Vig,et al. Long Short Term Memory Networks for Anomaly Detection in Time Series , 2015, ESANN.
[141] Ali Ismail Awad,et al. A Distributed Security Mechanism for Resource-Constrained IoT Devices , 2016, Informatica.
[142] W. Marsden. I and J , 2012 .
[143] Hwee Pink Tan,et al. Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications , 2014, IEEE Communications Surveys & Tutorials.
[144] Abhijit Chatterjee,et al. VIZOR: Virtually zero margin adaptive RF for ultra low power wireless communication , 2007, 2007 25th International Conference on Computer Design.
[145] Arijit Raychowdhury,et al. A 130 nm 165 nJ/frame Compressed-Domain Smashed-Filter-Based Mixed-Signal Classifier for “In-Sensor” Analytics in Smart Cameras , 2018, IEEE Transactions on Circuits and Systems II: Express Briefs.
[146] Yücel Altunbasak,et al. PINCO: a pipelined in-network compression scheme for data collection in wireless sensor networks , 2003, Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712).
[147] Sungyoung Lee,et al. Compressive sensing: From theory to applications, a survey , 2013, Journal of Communications and Networks.
[148] Jean-Louis Lacoume,et al. A Proposition for Correlation Power Analysis Enhancement , 2006, CHES.
[149] Shreyas Sen,et al. A 32 Gb/s Bidirectional 4-channel 4 pJ/b Capacitively Coupled Link in 14 nm CMOS for Proximity Communication , 2016, IEEE Journal of Solid-State Circuits.
[150] Pedram Mohseni,et al. 30 pJ/b, 67 Mbps, Centimeter-to-Meter Range Data Telemetry With an IR-UWB Wireless Link , 2015, IEEE Transactions on Biomedical Circuits and Systems.
[151] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[152] Shreyas Sen,et al. RF-PUF: IoT security enhancement through authentication of wireless nodes using in-situ machine learning , 2018, 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[153] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[154] Leyla Bilge,et al. Before we knew it: an empirical study of zero-day attacks in the real world , 2012, CCS.
[155] Eran Hammer-Lahav,et al. The OAuth 1.0 Protocol , 2010, RFC.
[156] Tom Rodden,et al. Exploiting Context in HCI Design for Mobile Systems , 1998 .
[157] T. Cover. Hypothesis Testing with Finite Statistics , 1969 .
[158] C. Jayakumar,et al. Node capture attack in Wireless Sensor Network: A survey , 2012, 2012 IEEE International Conference on Computational Intelligence and Computing Research.
[159] Santosh Ghosh,et al. ASNI: Attenuated Signature Noise Injection for Low-Overhead Power Side-Channel Attack Immunity , 2018, IEEE Transactions on Circuits and Systems I: Regular Papers.
[160] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[161] Shreyas Sen,et al. A sub-nW Wake-up Receiver for Human Body Communication , 2018, 2018 IEEE Biomedical Circuits and Systems Conference (BioCAS).
[162] Jan M. Rabaey,et al. A 2.4 GHz Interferer-Resilient Wake-Up Receiver Using A Dual-IF Multi-Stage N-Path Architecture , 2016, IEEE Journal of Solid-State Circuits.
[163] Shreyas Sen,et al. X-DeepSCA: Cross-Device Deep Learning Side Channel Attack* , 2019, 2019 56th ACM/IEEE Design Automation Conference (DAC).
[164] Kaushik Roy,et al. An Energy-Efficient Mixed-Signal Neuron for Inherently Error-Resilient Neuromorphic Systems , 2017, 2017 IEEE International Conference on Rebooting Computing (ICRC).
[165] Arijit Raychowdhury,et al. Appearance-based gesture recognition in the compressed domain , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[166] Dimitrios Peroulis,et al. A Wearable Real-time CMOS Dosimeter with Integrated Zero-bias Floating-Gate Sensor and an 861nW 18-bit Energy-Resolution Scalable Time-based Radiation to Digital Converter , 2019, 2019 IEEE Custom Integrated Circuits Conference (CICC).
[167] Srinivas Devadas,et al. Physical Unclonable Functions and Applications: A Tutorial , 2014, Proceedings of the IEEE.