Export Citations
StreamNet++: Memory-Efficient Streaming TinyML Model Compilation on Microcontrollers
The rapid growth of on-device artificial intelligence increases the importance of TinyML inference applications. However, the stringent tiny memory space on the microcontroller unit (MCU) raises the grand challenge when deploying deep neural network (DNN) ...
SmartTBD: Smart Tracking for Resource-constrained Object Detection
With the growing demand for video analysis on mobile devices, object tracking has demonstrated to be a suitable assistance to object detection under the Tracking-By-Detection (TBD) paradigm for reducing computational overhead and power demands. However, ...
A Highly Hardware Efficient ML-KEM Accelerator with Optimised Architectural Layers
The Module-Lattice-Based Key encapsulation Mechanism (ML-KEM) scheme, which is currently being standardised, is a quantum attack resistant KEM that is based on CRYSTALS-Kyber. CRYSTALS-Kyber is the only Public-key Encryption (PKE)/ KEM scheme selected in ...
Customized FPGA Implementation of Authenticated Lightweight Cipher Fountain for IoT Systems
Authenticated Encryption with Associated-Data (AEAD) can ensure both confidentiality and integrity of information in encrypted communication. Distinctive variants are customized from AEAD to satisfy various requirements. In this paper, we take a 128-bit ...
Implementing Privacy Homomorphism with Random Encoding and Computation Controlled by a Remote Secure Server
Remote IoT devices face significant security risks due to their inherent physical vulnerability. An adversarial actor with sufficient capability can monitor the devices or exfiltrate data to access sensitive information. Remotely deployed devices such as ...
LiteHash: Hash Functions for Resource-Constrained Hardware
The global paradigm shift toward edge computing has led to a growing demand for efficient integrity verification. Hash functions are one-way algorithms which act as a zero-knowledge proof of a datum’s contents. However, it is infeasible to compute hashes ...
APB-tree: An Adaptive Pre-built Tree Indexing Scheme for NVM-based IoT Systems
With the proliferation of sensors and the emergence of novel applications, IoT data has grown exponentially in recent years. Given this trend, efficient data management is crucial for a system to easily access vast amounts of information. For decades, B+-...
SENNA: Unified Hardware/Software Space Exploration for Parametrizable Neural Network Accelerators
Parametrizable neural network accelerators enable the deployment of targeted hardware for specialized environments. Finding the best architecture configuration for a given specification, however, is challenging. A large number of hardware configurations ...
HeterogeneousRTOS: A CPU-FPGA Real-Time OS for Fault Tolerance on COTS at Near-Zero Timing Cost
Ionizing particles in the atmosphere may strike circuits causing Single Event Upsets (SEU), affecting the output correctness. Critical real-time systems are traditionally custom-designed, featuring redundancy for guaranteeing fault resilience. The ...
PUF-Dilithium: Design of a PUF-Based Dilithium Architecture Benchmarked on ARM Processors
Addressing the looming threat posed by quantum computers capable of breaching current public key cryptography schemes has become imperative. To this end, the National Institute of Standards and Technology (NIST) initiated a competition in Post-Quantum ...
RAD-FS: Remote Timing and Power SCA Security in DVFS-augmented Ultra-Low-Power Embedded Systems
High-performance crypto-engines have become crucial components in modern System-On-Chip (SoC) architectures across platforms, from servers to edge-IoTs’. Alas, their secure operation faces a significant obstacle caused by information-leakage accessed ...
A Hybrid Target Selection Model of Functional Safety Compliance for Autonomous Driving System
The autonomous driving system faces challenges in selecting critical targets under dense environments with limited computation resources. Existing rule-based methods struggle with complex scenarios, while learning-based approaches lack interpretability ...