Advances and open problems in federated learning P Kairouz, HB McMahan, B Avent, A Bellet, M Bennis, AN Bhagoji, ... Foundations and trends® in machine learning 14 (1–2), 1-210, 2021 | 5456 | 2021 |
Coverage problems in wireless ad-hoc sensor networks MS Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak Infocom, 1380-1387, 2001 | 2957* | 2001 |
A survey of hardware trojan taxonomy and detection M Tehranipoor, F Koushanfar IEEE design & test of computers 27 (1), 10-25, 2010 | 1686 | 2010 |
Physical unclonable functions and applications: A tutorial C Herder, MD Yu, F Koushanfar, S Devadas Proceedings of the IEEE 102 (8), 1126-1141, 2014 | 1325 | 2014 |
Fresco: Modular composable security services for software-defined networks SW Shin, P Porras, V Yegneswara, M Fong, G Gu, M Tyson 20th Annual Network & Distributed System Security Symposium, 2013 | 1221* | 2013 |
EPIC: Ending piracy of integrated circuits JA Roy, F Koushanfar, IL Markov Proceedings of the conference on Design, automation and test in Europe, 1069 …, 2008 | 1131 | 2008 |
Exposure in wireless Ad-Hoc sensor networks S Meguerdichian, F Koushanfar, G Qu, M Potkonjak 7th annual international conference on Mobile computing and networking …, 2001 | 901 | 2001 |
A primer on hardware security: Models, methods, and metrics M Rostami, F Koushanfar, R Karri Proceedings of the IEEE 102 (8), 1283-1295, 2014 | 751 | 2014 |
Chameleon: A hybrid secure computation framework for machine learning applications MS Riazi, C Weinert, O Tkachenko, EM Songhori, T Schneider, ... Proceedings of the 2018 on Asia conference on computer and communications …, 2018 | 545 | 2018 |
Worst and best-case coverage in sensor networks S Megerian, F Koushanfar, M Potkonjak, MB Srivastava IEEE transactions on mobile computing 4 (1), 84-92, 2005 | 539 | 2005 |
Deepsecure: Scalable provably-secure deep learning BD Rouhani, MS Riazi, F Koushanfar Proceedings of the 55th annual design automation conference, 1-6, 2018 | 479 | 2018 |
Active Hardware Metering for Intellectual Property Protection and Security. Y Alkabani, F Koushanfar USENIX security symposium 20, 1-20, 2007 | 478 | 2007 |
Lightweight secure pufs M Majzoobi, F Koushanfar, M Potkonjak 2008 IEEE/ACM International Conference on Computer-Aided Design, 670-673, 2008 | 449 | 2008 |
Fault tolerance techniques for wireless ad hoc sensor networks F Koushanfar, M Potkonjak, A Sangiovanni-Vincentell SENSORS, 2002 IEEE 2, 1491-1496, 2002 | 369 | 2002 |
Deepinspect: A black-box trojan detection and mitigation framework for deep neural networks. H Chen, C Fu, J Zhao, F Koushanfar IJCAI 2 (5), 8, 2019 | 350 | 2019 |
{XONN}:{XNOR-based} oblivious deep neural network inference MS Riazi, M Samragh, H Chen, K Laine, K Lauter, F Koushanfar 28th USENIX Security Symposium (USENIX Security 19), 1501-1518, 2019 | 314 | 2019 |
Techniques for design and implementation of secure reconfigurable PUFs M Majzoobi, F Koushanfar, M Potkonjak ACM Transactions on Reconfigurable Technology and Systems (TRETS) 2 (1), 1-33, 2009 | 279 | 2009 |
Exposure in wireless sensor networks: Theory and practical solutions S Megerian, F Koushanfar, G Qu, G Veltri, M Potkonjak Wireless Networks 8, 443-454, 2002 | 274 | 2002 |
Testing techniques for hardware security M Majzoobi, F Koushanfar, M Potkonjak 2008 IEEE International Test Conference, 1-10, 2008 | 269 | 2008 |
Tinygarble: Highly compressed and scalable sequential garbled circuits EM Songhori, SU Hussain, AR Sadeghi, T Schneider, F Koushanfar 2015 IEEE Symposium on Security and Privacy, 411-428, 2015 | 268 | 2015 |