Standout Papers
- Modeling attacks on physical unclonable functions (2010)
- Extracting secret keys from integrated circuits (2005)
- PUF Modeling Attacks on Simulated and Silicon Data (2013)
- Physical unclonable functions for device authentication and secret key generation (2007)
- Physical Unclonable Functions and Applications: A Tutorial (2014)
Citation Impact
Citing Papers
Uncovering a novel role of PLCβ4 in selectively mediating TCR signaling in CD8+ but not CD4+ T cells
2021
De novo design of transmembrane β barrels
2021 StandoutScienceNobel
Physical key-protected one-time pad
2013
A genetic method specifically delineates Th1-type Treg cells and their roles in tumor immunity
2023 StandoutNobel
Inkjet-printed unclonable quantum dot fluorescent anti-counterfeiting labels with artificial intelligence authentication
2019 Standout
Engineered receptors for soluble cellular communication and disease sensing
2024 StandoutNatureNobel
Platelet factor 4–induced T H 1-T reg polarization suppresses antitumor immunity
2024 StandoutScienceNobel
DNA methylation and epigenetic inheritance
1990 Standout
The MetaCyc database of metabolic pathways and enzymes and the BioCyc collection of pathway/genome databases
2015 Standout
Adoptive T Cell Therapies: A Comparison of T Cell Receptors and Chimeric Antigen Receptors
2015
A Completely Reimplemented MPI Bioinformatics Toolkit with a New HHpred Server at its Core
2017 Standout
Biological roles of glycans
2016 Standout
Fully hardware-implemented memristor convolutional neural network
2020 StandoutNature
Applications of contact predictions to structural biology
2017 StandoutNobel
HHomp—prediction and classification of outer membrane proteins
2009
PASTA 2.0: an improved server for protein aggregation prediction
2014
De novo design of a fluorescence-activating β-barrel
2018 StandoutNatureNobel
Glycans as Key Checkpoints of T Cell Activity and Function
2018
How does the kinase Lck phosphorylate the T cell receptor? Spatial organization as a regulatory mechanism
2012
New insights into the T cell synapse from single molecule techniques
2011
N-glycosylation bidirectionally extends the boundaries of thymocyte positive selection by decoupling Lck from Ca2+ signaling
2014
A guide to cancer immunotherapy: from T cell basic science to clinical practice
2020 Standout
A Membrane Burial Potential with H-Bonds and Applications to Curved Membranes and Fast Simulations
2018 StandoutNobel
A Comprehensive Survey on Particle Swarm Optimization Algorithm and Its Applications
2015 Standout
Glycoproteomics
2022 StandoutNobel
Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey
2018 Standout
The self-organizing map
1990 Standout
A survey of security issues in hardware virtualization
2013
Literature review of Industry 4.0 and related technologies
2018 Standout
T‐cell receptor signaling and the pathogenesis of autoimmune arthritis: insights from mouse and man
2012 StandoutNobel
Privacy-Aware Authenticated Key Agreement Scheme for Secure Smart Grid Communication
2018
Motor Anomaly Detection for Unmanned Aerial Vehicles Using Reinforcement Learning
2017 Standout
GTxChain: A Secure IoT Smart Blockchain Architecture Based on Graph Neural Network
2023 Standout
A survey on internet of things security from data perspectives
2018
Mutual Authentication in IoT Systems Using Physical Unclonable Functions
2017
Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers
2008 Standout
Two-Factor Authentication for IoT With Location Information
2018
Security and privacy in the internet of things
2017
Introduction to Cyber-Physical System Security: A Cross-Layer Perspective
2016
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
2016 Standout
Binary particle swarm optimization (BPSO) based state assignment for area minimization of sequential circuits
2013
XOR-Based Low-Cost Reconfigurable PUFs for IoT Security
2019
M2M Security: Challenges and Solutions
2016
Application of Internet of Things and Virtual Reality Technology in College Physical Education
2020 Standout
An Efficient Privacy-Preserving Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication
2019 Standout
Networks on chips: a new SoC paradigm
2002 Standout
Sustainability and Digital Transformation in the Visegrad Group of Central European Countries
2021 Standout
IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices
2019
Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions
2016
A Survey on Supply Chain Security: Application Areas, Security Threats, and Solution Architectures
2020
S2M: A Lightweight Acoustic Fingerprints-Based Wireless Device Authentication Protocol
2016
Self-Assembled Resonance Energy Transfer Keys for Secure Communication over Classical Channels
2015
Industry 4.0: A survey on technologies, applications and open research issues
2017 Standout
Robust authentication through stochastic femtosecond laser filament induced scattering surfaces
2016
Industrial Internet-of-Things Security Enhanced With Deep Learning Approaches for Smart Cities
2020 Standout
Internet of Things (IoT) for Next-Generation Smart Systems: A Review of Current Challenges, Future Trends and Prospects for Emerging 5G-IoT Scenarios
2020 Standout
Big data in healthcare: management, analysis and future prospects
2019 Standout
Cyber Physical Security for Industrial Control Systems and IoT
2016
Dynamic Voltage Scaling in Multitier Web Servers with End-to-End Delay Control
2007 Standout
Digital Twin: Enabling Technologies, Challenges and Open Research
2020 Standout
Physical unclonable functions
2020 Standout
Unclonable security features for additive manufacturing
2014
Computational modeling of membrane proteins
2014
The Internet of Things: Review and theoretical framework
2019 Standout
Lest we remember
2009 Standout
Particle Swarm Optimization: A Comprehensive Survey
2022 Standout
Principles and methods of testing finite state machines-a survey
1996 Standout
In-memory computing with resistive switching devices
2018 Standout
Crystal structure of a complete ternary complex of T-cell receptor, peptide–MHC, and CD4
2012
ATT-Auth: A Hybrid Protocol for Industrial IoT Attestation With Authentication
2018
Physical Unclonable Function Exploiting Sneak Paths in Resistive Cross-point Array
2016
Energy-aware wireless microsensor networks
2002 Standout
The processor-memory bottleneck
1999
A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
2019 Standout
Predicting Three-Dimensional Structures of Transmembrane Domains of β-Barrel Membrane Proteins
2011
Token-Based Security for the Internet of Things With Dynamic Energy-Quality Tradeoff
2018
System-level power optimization
2000
Digital Circuit Optimization via Geometric Programming
2005
Mobile Edge Computing: A Survey
2017 Standout
RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using <italic>In-Situ</italic> Machine Learning
2018
A Survey of Hardware Trojan Taxonomy and Detection
2010 Standout
A neural net based self organising scheduling algorithm
2002
Utilizing the Variability of Resistive Random Access Memory to Implement Reconfigurable Physical Unclonable Functions
2014
SCIP: solving constraint integer programs
2009
Secure Key Generation in Sensor Networks Based on Frequency-Selective Channels
2013
Physically unclonable cryptographic primitives using self-assembled carbon nanotubes
2016
Instruction level power analysis and optimization of software
1996
Comparative analysis of TCR and CAR signaling informs CAR designs with superior antigen sensitivity and in vivo function
2021
Architecture for Protecting Critical Secrets in Microprocessors
2005
Context-Aware Intelligence in Resource-Constrained IoT Nodes: Opportunities and Challenges
2019
Cyber-Physical Systems Security—A Survey
2017 Standout
Fault detection with multiple observers
1993
Theory and Applications of Robust Optimization
2011 Standout
Automatic functional test generation using the extended finite state machine model
1993
N‐Carboxyanhydride Polymerization of Glycopolypeptides That Activate Antigen‐Presenting Cells through Dectin‐1 and Dectin‐2
2018 StandoutNobel
Physical unclonable functions generated through chemical methods for anti-counterfeiting
2017 Standout
Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices
2018
System-level power-aware design techniques in real-time systems
2003
Works of Srinivas Devadas being referenced
Efficient memory integrity verification and encryption for secure processors
2003
Identification and authentication of integrated circuits: Research Articles
2004
Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching
2012
Modeling ensembles of transmembrane β‐barrel proteins
2007
A text-compression-based method for code size minimization in embedded systems
1999
PUF Modeling Attacks on Simulated and Silicon Data
2013 Standout
Aegis: A Single-Chip Secure Processor
2007
Algorithms for hardware allocation in data path synthesis
1989
Test generation and verification for highly sequential circuits
1991
Controlled physical random functions and applications
2008
Trapdoor computational fuzzy extractors and stateless cryptographically-secure physical unclonable functions
2016
Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions
2005
Physical unclonable functions for device authentication and secret key generation
2007 Standout
Decomposition and factorization of sequential finite state machines
1989
Code density optimization for embedded DSP processors using data compression techniques
1998
A Survey of Optimization Techniques Targeting Low Power VLSI Circuits
1995
Secure and robust error correction for physical unclonable functions
2010
Physical Unclonable Functions and Applications: A Tutorial
2014 Standout
Functional vector generation for HDL models using linear programming and Boolean satisfiability
2001
Identification and authentication of integrated circuits
2004
MUSTANG: state assignment of finite state machines targeting multilevel logic implementations
1988
Modeling attacks on physical unclonable functions
2010 Standout
A method for probing the mutational landscape of amyloid structure
2011
AEGIS: A single-chip secure processor
2005
Extracting secret keys from integrated circuits
2005 Standout
A Lockdown Technique to Prevent Machine Learning on PUFs for Lightweight Authentication
2016
Test generation for sequential circuits
1988
Suppressing the Oblivious RAM timing channel while making information leakage and program efficiency trade-offs
2014
Precomputation-based sequential logic optimization for low power
1994
Physical Unclonable Functions for Device Authentication and Secret Key Generation
2007
CD4 and CD8 binding to MHC molecules primarily acts to enhance Lck delivery
2010
Statistical timing analysis of combinational logic circuits
1993
Recombination of Physical Unclonable Functions
2010
Random numbers from metastability and thermal noise
2005
Caches and Merkle Trees for Efficient Memory Authentication
2011