Select Publications
Books
2010, Power Analysis Side Channel Attacks: The Processor Design-level Context, VDM Verlag Dr. Müller, Germany, http://www.amazon.com/Power-Analysis-Side-Channel-Attacks/dp/3836485087
,Book Chapters
2017, 'On an asymptotic equality for reproducing kernels and sums of squares of orthonormal polynomials', in Springer Optimization and Its Applications, pp. 129 - 144, http://dx.doi.org/10.1007/978-3-319-49242-1_7
,2015, 'Robust Aggregation of Inconsistent Information', in Matei S; Russell M; Bertino E (ed.), Transparency in Social Media Tools, Methods and Algorithms for Mediating Online Interactions, Springer, pp. 29 - 49
,2007, 'Design and runtime compression for embedded systems', in Henkel J; Parameswaran S (ed.), Designing embedded processors: a low power perspective, Springer Verlag, Dordrecht, The Netherlands, pp. 97 - 128
,Journal articles
2022, 'A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks', IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, pp. 589 - 613, http://dx.doi.org/10.46586/tches.v2022.i4.589-613
,2021, 'QuadSeal: Quadruple Balancing to Mitigate Power Analysis Attacks with Variability Effects and Electromagnetic Fault Injection Attacks', ACM Transactions on Design Automation of Electronic Systems, 26, http://dx.doi.org/10.1145/3443706
,2021, 'Trust-Based Blockchain Authorization for IoT', IEEE Transactions on Network and Service Management, 18, pp. 1646 - 1658, http://dx.doi.org/10.1109/TNSM.2021.3077276
,2021, 'Machine learning for accelerating 2D flood models: Potential and challenges', Hydrological Processes, 35, http://dx.doi.org/10.1002/hyp.14064
,2021, 'Simeon -- Secure Federated Machine Learning Through Iterative Filtering', , http://arxiv.org/abs/2103.07704v1
,2021, 'UCloD: Small Clock Delays to Mitigate Remote Power Analysis Attacks', IEEE Access, 9, pp. 108411 - 108425, http://dx.doi.org/10.1109/ACCESS.2021.3100618
,2021, 'VITI: A Tiny Self-Calibrating Sensor for Power-Variation Measurement in FPGAs', IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, pp. 657 - 678, http://dx.doi.org/10.46586/tches.v2022.i1.657-678
,2020, 'An Adaptive Denoising Algorithm for Improving Frequency Estimation and Tracking', IEEE Transactions on Circuits and Systems II: Express Briefs, 67, pp. 172 - 176, http://dx.doi.org/10.1109/TCSII.2019.2898451
,2020, 'Hardware Trojan mitigation in pipelined MPSoCs', ACM Transactions on Design Automation of Electronic Systems, 25, http://dx.doi.org/10.1145/3365578
,2020, 'Hardware Trojan Mitigation in Pipelined MPSoCs.', ACM Trans. Design Autom. Electr. Syst., 25, pp. 6:1 - 6:1, http://dx.doi.org/10.1145/3365578
,2019, 'Time domain modelling of concurrent insertion and capacitive storage using Laplace domain representations of impedance', Journal of Electroanalytical Chemistry, 850, http://dx.doi.org/10.1016/j.jelechem.2019.113379
,2019, 'Analyzing XACML policies using answer set programming', International Journal of Information Security, 18, pp. 465 - 479, http://dx.doi.org/10.1007/s10207-018-0421-5
,2019, 'Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting', IEEE Transactions on Mobile Computing, 18, pp. 1274 - 1287, http://dx.doi.org/10.1109/TMC.2018.2861384
,2019, 'On reconstruction of bandlimited signals from purely timing information', Signal Processing, 159, pp. 89 - 92, http://dx.doi.org/10.1016/j.sigpro.2019.02.002
,2019, 'Pairwise alignment of nucleotide sequences using maximal exact matches', BMC Bioinformatics, 20, pp. 261, http://dx.doi.org/10.1186/s12859-019-2827-0
,2019, 'Pitt Modelling of Concurrent Ion-Insertive and Capacitive Storage Using Laplace Domain Representations of Impedance', ECS Meeting Abstracts, MA2019-01, pp. 515 - 515, http://dx.doi.org/10.1149/ma2019-01/5/515
,2019, 'A Trust-Based Experience-Aware Framework for Integrating Fuzzy Recommendations', IEEE Transactions on Services Computing, http://dx.doi.org/10.1109/TSC.2019.2956937
,2019, 'Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting.', IEEE Trans. Mob. Comput., 18, pp. 1274 - 1287, http://dx.doi.org/10.1109/TMC.2018.2861384
,2018, 'Signal recovery algorithm for 2-level amplitude sampling using chromatic signal approximations', Signal Processing, 153, pp. 143 - 152, http://dx.doi.org/10.1016/j.sigpro.2018.07.009
,2018, 'A provenance-aware multi-dimensional reputation system for online rating systems', ACM Transactions on Internet Technology, 18, http://dx.doi.org/10.1145/3183323
,2018, 'Chromatic Derivatives and Approximations in Practice - Part I: A General Framework', IEEE Transactions on Signal Processing, 66, pp. 1498 - 1512, http://dx.doi.org/10.1109/TSP.2017.2787127
,2018, 'Chromatic Derivatives and Approximations in Practice - Part II: Nonuniform Sampling, Zero-Crossings Reconstruction, and Denoising', IEEE Transactions on Signal Processing, 66, pp. 1513 - 1525, http://dx.doi.org/10.1109/TSP.2017.2787149
,2018, 'A Provenance-Aware Multi-dimensional Reputation System for Online Rating Systems.', ACM Trans. Internet Techn., 18, pp. 55:1 - 55:1, http://dx.doi.org/10.1145/3183323
,2017, 'Mobility based Net Ordering for Simultaneous Escape Routing', INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 8, pp. 452 - 461, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000407334500062&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2017, 'Improved VCF normalization for accurate VCF comparison.', Bioinformatics, 33, pp. 964 - 970, http://dx.doi.org/10.1093/bioinformatics/btw748
,2016, 'Asymptotic behaviour of some families of orthonormal polynomials and an associated Hilbert space', Journal of Approximation Theory, 210, pp. 41 - 79, http://dx.doi.org/10.1016/j.jat.2016.06.002
,2016, 'Simultaneous escape routing using network flow optimization', Malaysian Journal of Computer Science, 29, pp. 86 - 105, http://dx.doi.org/10.22452/mjcs.vol29no2.2
,2015, 'Interdependent Security Risk Analysis of Hosts and Flows', IEEE Transactions on Information Forensics and Security, 10, pp. 2325 - 2339, http://dx.doi.org/10.1109/TIFS.2015.2455414
,2015, 'An iterative method for calculating robust rating scores', IEEE Transactions on Parallel and Distributed Systems, 26, pp. 340 - 350, http://dx.doi.org/10.1109/TPDS.2013.215
,2015, 'CSI-MIMO: An efficient Wi-Fi fingerprinting using Channel State Information with MIMO', Pervasive and Mobile Computing, 23, pp. 89 - 103, http://dx.doi.org/10.1016/j.pmcj.2015.07.002
,2015, 'Robust evaluation of products and reviewers in social rating systems', World Wide Web, 18, pp. 73 - 109, http://dx.doi.org/10.1007/s11280-013-0242-4
,2015, 'Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks', IEEE Transactions on Dependable and Secure Computing, 12, pp. 98 - 110, http://dx.doi.org/10.1109/TDSC.2014.2316816
,2015, 'An Iterative Method for Calculating Robust Rating Scores.', IEEE Trans. Parallel Distributed Syst., 26, pp. 340 - 350, http://dx.doi.org/10.1109/TPDS.2013.215
,2014, 'Representation and querying of unfair evaluations in social rating systems', Computers and Security, 41, pp. 68 - 88, http://dx.doi.org/10.1016/j.cose.2013.09.008
,2014, 'Performance estimation of pipelined multiprocessor system-on-chips (MPSoCs)', IEEE Transactions on Parallel and Distributed Systems, 25, pp. 2159 - 2168, http://dx.doi.org/10.1109/TPDS.2013.268
,2013, 'Efficient computation of robust average of compressive sensing data in wireless sensor networks in the presence of sensor faults', IEEE Transactions on Parallel and Distributed Systems, 24, pp. 1525 - 1534, http://dx.doi.org/10.1109/TPDS.2012.260
,2013, 'Quality control in crowdsourcing systems: Issues and directions', IEEE Internet Computing, 17, pp. 76 - 81, http://dx.doi.org/10.1109/MIC.2013.20
,2013, 'Robust Evaluation of Products and Reviewers in Social Rating Systems', World Wide Web - Internet and Web Information Systems, http://dx.doi.org/10.1007/s11280-013-0242-4
,2012, 'An Analytic Approach to People Evaluation in Crowdsourcing Systems', , http://arxiv.org/abs/1211.3200v1
,2012, 'Detecting, Representing and Querying Collusion in Online Rating Systems', , http://arxiv.org/abs/1211.0963v1
,2012, 'Differential Power Analysis in AES: A Crypto Anatomy', IJEI: International Journal of Engineering and Industries, 2, pp. 118 - 130, http://www.aicit.org/ijei/global/paper_detail.html?jname=IJEI&q=46
,2011, 'Multidimensional chromatic derivatives and series expansions', Proceedings of the American Mathematical Society, 139, pp. 647 - 656
,2011, 'Multiprocessor information concealment architecture to prevent power analysis-based side channel attacks', IET Computers and Digital Techniques, 5, pp. 1 - 15, http://dx.doi.org/10.1049/iet-cdt.2009.0097
,2010, 'Optimal synthesis of latency and throughput constrained pipelined MPSoCs targeting streaming applications', 2010 IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2010, pp. 75 - 84
,2010, 'Multidimensional chromatic derivatives and series expansions', Proceedings of the American Mathematical Society, 139, pp. 3513 - 3525, http://dx.doi.org/10.1090/S0002-9939-2011-10789-5
,2010, 'Rapid Design Space Exploration of Application Specific Heterogeneous Pipelined Multiprocessor Systems', IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 29, pp. 1777 - 1789, http://dx.doi.org/10.1109/TCAD.2010.2061353
,