Latest Publications


Conference

1. F. Tarik, Y Lao, J Ryckman, " Electro-optical modulation characteristics of silicon photonic moiré quasicrystal interferometers ," Active Photonic Platforms (APP) 2024, PC131101O, October 2024.

2. W. Tan, Y. Lao, K. Parhi, " Area-Efficient Matrix-Vector Polynomial Multiplication Architecture for ML-KEM Using Interleaving and Folding Transformation ," 2024 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5, May 2024.

3. Q. Nguyen, Y. Lao, T. Pham, K. Wong, K. Doan, " Understanding the Robustness of Randomized Feature Defense Against Query-Based Adversarial Attacks ," ICLR 2024, May 2024.

4. J. Clements, Y. Lao, " Resource Efficient Deep Learning Hardware Watermarks with Signature Alignment ," Proceedings of the AAAI Conference on Artificial Intelligence, March 2024.

5. J. Liu, Y. Lao, Y. Mao, R. Buyya, " Sailfish: A Dependency-Aware and Resource Efficient Scheduling for Low Latency in Clouds ," 2023 IEEE International Conference on Big Data (BigData), 237-246, December 2023.

6. A. Wang, Y. Lao, " Homomorphic Evaluation Friendly Vision Transformer Design ," 2023 57th Asilomar Conference on Signals, Systems, and Computers, 7-10, October 2023.

7. W. Tan, Y. Lao, K. K. Parhi, " KyberMat: Efficient Accelerator for Matrix-Vector Polynomial Multiplication in CRYSTALS-Kyber Scheme via NTT and Polyphase Decomposition ," 2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD), 1-9, October 2023.

8. J. Tine, S. Puspa, R. Majumdar, G. Comert, M. Chowdhury, Y. Lao, " Threats of Trojan Incursion in Transportation Hardware ," 2023 IEEE International Automated Vehicle Validation Conference (IAVVC), 1-7, October 2023.

10. H. Lin, J. Chung, Y. Lao, W. Zhao, " Machine unlearning in gradient boosting decision trees ," Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, August 2023.

11. A. Wang, B. Zhao, W. Tan, Y. Lao, " NNTesting: Neural Network Fault Attacks Detection Using Gradient-Based Test Vector Generation ," 2023 60th ACM/IEEE Design Automation Conference (DAC), 1-6, July 2023.

12. K. Doan, Y. Lao, P. Yang, P. Li, " Defending backdoor attacks on vision transformer via patch processing ," Proceedings of the AAAI Conference on Artificial Intelligence 37 (1), 506-515, June 2023.

13. B. Zhao, Z. Yu, S. Lan, Y. Cheng, A. Anandkumar, Y. Lao, J. Alvarez, " Fully attentional networks with self-emerging token labeling ," Proceedings of the IEEE/CVF International Conference on Computer Vision, March 2023.

14. K. Doan, Y. Lao, P. Yang, and P. Li,, " Defending Backdoor Attacks on Vision Transformer via Patch Processing ," Proc. of Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI-23), February 2023.

15. K. Doan, Y. Lao, P. Li, " Marksman backdoor: Backdoor attacks with arbitrary target class ," Advances in Neural Information Processing Systems 35, 38260-38273, December 2022.

16. C. Kowalski, A. Famili, Y. Lao, " Towards Model Quantization On The Resilience Against Membership Inference Attacks ," Proc. of 29th IEEE International Conference on Image Processing (ICIP), October 2022.

17. A. Wang, W. Tan, Y. Lao, K. K. Parhi, " Integral Sampler and Polynomial Multiplication Architecture for Lattice-based Cryptography ," Proc. of 35th IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, October 2022.

18. A. Wang, W. Tan, K. K. Parhi, Y. Lao, " Integral sampler and polynomial multiplication architecture for lattice-based cryptography ," 2022 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), October 2022.

19. C. Kowalski, A. Famili, Y. Lao, " Towards model quantization on the resilience against membership inference attacks ," 2022 IEEE International Conference on Image Processing (ICIP), 3646-3650, October 2022.

20. F. B. Tarik, A. Famili, Y. Lao, J. D. Ryckman, " Scalable and CMOS compatible silicon photonic physical unclonable functions for supply chain assurance ," Scientific Reports 12 (1), 15653, September 2022.

21. W. Zhao, Y. Lao, P. Li, " Integrity Authentication in Tree Models ," Proc. of 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), pp. 2585–2593, August 2022.

22. A. Famili, Y. Lao, " Genetic-based Joint Dynamic Pruning and Learning Algorithm to Boost DNN Performance ," Proc. of 26th International Conference on Pattern Recognition (ICPR), August 2022.

23. A. Famili, Y. Lao, " Genetic-based joint dynamic pruning and learning algorithm to boost dnn performance ," 2022 26th International conference on pattern recognition (ICPR), 2100-2106, August 2022.

24. W. Zhao, Y. Lao, P. Li, " Integrity authentication in tree models ," Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, August 2022.

25. J. Clements, Y. Lao, " DeepHardMark: Towards watermarking neural network hardware ," Proceedings of the AAAI Conference on Artificial Intelligence 36 (4), 4450-4458, June 2022.

26. Y. Lao, W. Zhao, P. Yang, P. Li, " Deepauth: A dnn authentication framework by model-unique and fragile signature embedding ," Proceedings of the AAAI Conference on Artificial Intelligence 36 (9), 9595-9603, June 2022.

28. J. Clements, Y. Lao, " In Pursuit of Preserving the Fidelity of Adversarial Images ," Proc. of International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 2859-2863, May 2022.

29. F. B. Tarik, D. Joyce, Y. Lao, J. D. Ryckman, " Electrically Reconfigurable Photonic PUF based on a Moire Quasicrystal Interferometer ," roc. of CLEO: Science and Innovations, pp. JW3A.30, May 2022.

30. Y. Lao, P. Yang, W. Zhao, P. Li, " Identification for Deep Neural Network: Simply Adjusting Few Weights ," Proc. of IEEE International Conference on Data Engineering (ICDE), pp. 1328-1341, May 2022.

31. F. B. Tarik, D. Joyce, Y. Lao, J. D. Ryckman, " Electrically reconfigurable photonic PUF based on a moiré quasicrystal interferometer ," CLEO: QELS_Fundamental Science, JW3A. 30, May 2022.

32. Y. Lao, P. Yang, W. Zhao, P. Li, " Identification for deep neural network: Simply adjusting few weights! ," 2022 IEEE 38th International Conference on Data Engineering (ICDE), 1328-1341, May 2022.

33. J. Sun, N. Sharma, J. Chakareski, N. Mastronarde, Y. Lao, " Hardware acceleration for postdecision state reinforcement learning in IoT systems ," IEEE Internet of Things Journal 9 (12), 9889-9903, March 2022.

34. B. Zhao, Y. Lao, " CLPA: Clean-Label Poisoning Availability Attacks Using Generative Adversarial Nets ," Proc. of Thirty-Sixth AAAI Conference on Artificial Intelligence (AAAI-22), February 2022.

35. J. Clements, Y. Lao, " DeepHardMark: Towards Watermarking Neural Network Hardware ," Proc. of Thirty-Sixth AAAI Conference on Artificial Intelligence (AAAI-22), February 2022.

36. Y. Lao, W. Zhao, P. Yang, P. Li, " DeepAuth: A DNN Authentication Framework by Model-Unique and Fragile Signature Embedding ," Proc. of Thirty-Sixth AAAI Conference on Artificial Intelligence (AAAI-22), February 2022.

37. B. Zhao, Y. Lao, " Towards Class-Oriented Poisoning Attacks Against Neural Networks ," Proc. of Winter Conference on Applications of Computer Vision (WACV), January 2022.

38. B. Zhao, Y. Lao, " Towards class-oriented poisoning attacks against neural networks ," Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, January 2022.

39. K. Doan, Y. Lao, P. Li, " Backdoor Attack with Imperceptible Input and Latent Modification ," Proc. of Neural Information Processing Systems (NeurIPS), December 2021.

40. W. Tan, A. Wang, Y. Lao, X. Zhang, K.K. Parhi, " Pipelined High-throughput NTT Architecture for Lattice-based Cryptography ," Proc. of Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pp. 1-4, December 2021.

41. J. Clements, Y. Yang, A. Sharma, H. Hu, Y. Lao, " Rallying Adversarial Techniques against Deep Learning for Network Security ," Proc. of IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1-8, December 2021.

42. F. B. Tarik, A. Famili, Y. Lao, J. D. Ryckman, " Secure Authentication of 56 Physically Unclonable Silicon Photonic Integrated Circuits ," Proc. of 2021 IEEE Group IV Photonics Conference (GFP), pp. 1-2, December 2021.

43. W. Tan, A. Wang, Y. Lao, X. Zhang, K. K. Parhi, " Pipelined high-throughput NTT architecture for lattice-based cryptography ," 2021 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 1-4, December 2021.

44. F. B. Tarik, A. Famili, Y. Lao, J. D. Ryckman, " Secure authentication of 56 physically unclonable silicon photonic integrated circuits ," 2021 IEEE 17th International Conference on Group IV Photonics (GFP), 1-2, December 2021.

45. J. Clements, Y. Yang, A. A. Sharma, H. Hu, Y. Lao, " Rallying adversarial techniques against deep learning for network security ," 2021 IEEE symposium series on computational intelligence (SSCI), 01-08, December 2021.

46. P. Yang, Y. Lao, P. Li, " Robust Watermarking for Deep Neural Networks via Bi-level Optimization ," Proc. of International Conference on Computer Vision (ICCV), pp. 14841-14850, October 2021.

47. K. Doan, Y. Lao, W. Zhao, P. Li, " LIRA: Learnable, Imperceptible and Robust Backdoor Attacks ," Proc. of International Conference on Computer Vision (ICCV), pp. 11966-11976, October 2021.

48. F. B. Tarik, A. Famili, Y. Lao, J. D. Ryckman, " Analysis of 56 Physically Unclonable Silicon Photonic Moire Quasicrystal Interferometers ," Proc. of CLEO: Science and Innovations, pp. FTu2M.7, May 2021.

49. P. Yang, Y. Lao, P. Li, " Robust watermarking for deep neural networks via bi-level optimization ," Proceedings of the IEEE/CVF international conference on computer vision, January 2021.

50. X. Wang, Y. Lao, Y. Gu, B. Fang, " Haptic Glove for Object Recognition and Hand Motion Detection ," Proc. of 2020 China Automation Congress (CAC), pp. 7192-7196, November 2020.

51. W. Tan, A. Wang, Y. Xu, Y. Lao, " Area-efficient Pipelined VLSI Architecture for Polar Decoder ," Proc. of IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pp. 352-357, July 2020.

52. J. Sun, N. Sharma, J. Chakareski, N. Mastronarde, Y Lao, " Action Evaluation Hardware Accelerator for Next-Generation Real-Time Reinforcement Learning in Emerging IoT Systems ," Proc. of IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pp. 428-433, July 2020.

53. F. B. Tarik, A. Famili, Y. Lao, J. D. Ryckman, " Robust optical physical unclonable function using disordered photonic integrated circuits ," Nanophotonics 9 (9), 2817-2828, July 2020.

54. F. B. Tarik, A. Famili, Y. Lao, J. D. Ryckman, " Realization of Robust Optical Physical Unclonable Function Using a Silicon Photonic Quasicrystal Interferometer ," Proc. of CLEO: Science and Innovations, pp. SF3J-2, May 2020.

55. A. Famili, C. Pathiravasam, Y, Lao, G. K. Venayagamoorthy, " Device-Specific Signature Generation Technique for Smart Grid Device ," Proc. of IEEE Power Systems Conference (PSC), pp. 1-5, March 2020.

56. Y. Xu, Y. Lao, W. Liu, C. Zhang, " Security Analysis and Modeling Attacks on Duty Cycle Multiplexer PUF ," Proc. of 2019 IEEE 13th International Conference on ASIC (ASICON), pp. 1-4, November 2019.

57. W. Tan, G. Hu, B. Case, S. Gao, Y. Lao, " An Efficient Polynomial Multiplier Architecture for the Bootstrapping Algorithm in A Fully Homomorphic Encryption Scheme ," Proc. of 2019 IEEE International Workshop on Signal Processing Systems, pp. 85-90, October 2019.

58. L. Qiu, Z. Zhang, J. Calhoun, Y. Lao, " Towards Data-Driven Approximate Circuit Design ," Proc. of IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pp. 397-402, July 2019.

59. A. Sharma, X. Zhang, Y. Lao, " Hardware Obfuscation Through Reconfiguration Finite Field Arithmetic Units ," Proc. of 2019 IEEE International Symposium on Circuits and Systems (ISCAS), May 2019.

60. J. Clements, Y. Lao, " Hardware Trojan Design on Neural Networks ," Proc. of 2019 IEEE International Symposium on Circuits and Systems (ISCAS), May 2019.

61. J. Clements, Y. Lao, " Backdoor Attacks on Neural Network Operations ," Proc. of 2018 6th IEEE Global Conference on Signal and Information Processing, pp. 1154-1158, November 2018.

62. B. Zhao, Y. Lao, " Resilience of Pruned Neural Network Against Poisoning Attack ," Proc. of 2018 IEEE International Conference on Malicious and Unwanted Software, pp. 78-83, October 2018.

63. S. Kai, Y. Shen, Y. Lao, Z. Zhang, X. You, Chuan Zhang, " A New Error Correction Scheme for Physical Unclonable Function ," Proc. of 2018 IEEE Asia Pacific Conference on Circuits and Systems, pp. 374-377, October 2018.

64. Y. Wen, Y. Lao, " Efficient PUF Error Correction Through Response Weighting ," Proc. of 2018 IEEE International Midwest Symposium on Circuits and Systems, August 2018.

65. X. Wang, Y. Lao, " Utilizing Inherent Randomness in Stochastic Computing ," Proc. of 2018 IEEE International Midwest Symposium on Circuits and Systems, August 2018.

66. Y. Wen, Y. Lao, " PUF Modeling Attack using Active Learning ," Proc. of 2018 IEEE International Symposium on Circuits and Systems (ISCAS), May 2018.

67. L. Qiu, Y. Lao, " A Systematic Method for Approximate Circuit Design Using Feature Selection ," Proc. of 2018 IEEE International Symposium on Circuits and Systems (ISCAS), May 2018.

68. Y. Xu, Y. Lao, W. Liu, X. You, C. Zhang, " DC MUX PUF: A Highly Reliable Feed-Back MUX PUF Based on Measuring Duty Cycle ," Proc. of 11th International collaboration Symposium on Information, Production and Systems, pp. 883-886, November 2017.

69. Y. Wen, Y. Lao, " Efficient Fuzzy Extractor Implementations for PUF Based Authentication ," Proc. of  2017 IEEE International Conference on Malicious and Unwanted Software, pp. 119-125, October 2017.

70. Y. Wen, Y. Lao, " Enhancing PUF Reliability by Machine Learning ," Proc. of IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1-4, May 2017.

71. Y. Lao, K. K. Parhi, " Data-Canonic Real FFT Flow-Graphs for Composite Lengths ," Proc. of  2016 IEEE International Workshop on Signal Processing Systems, pp. 189-194, October 2016.

72. C. Zhou, S. Satapathy, Y. Lao, K.K. Parhi, C.H. Kim, " Soft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs ," Proc. 2016 International Symposium on Low Power Electronics and Design (ISLPED), pp. 124-129, August 2016. (Best Paper Award).

73. Y. Lao, Q. Tang, C. H. Kim, K. K. Parhi, " Beat Frequency Detector--Based High-Speed True Random Number Generators: Statistical Modeling and Analysis ," ACM Journal on Emerging Technologies in Computing Systems (JETC) 13 (1), 1-25, April 2016.

74. S. V. S. Avvaru, C. Zhou, S. Satapathy, Y. Lao, C. H. Kim, K. K. Parhi, " Estimating Delay Differences of Arbiter PUFs Using Silicon Data ," Proc. of 2016 Design, Automation and Test in Europe (DATE), March 2016.

75. Y. Lao, K. K. Parhi, " Canonic Real-Valued Radix-2n FFT Computations ," Proc. of 2015 Asilomar Conference on Signals, Systems and Computers, November 2015.

76. G. C. Shanmugam, Y. Lao, K. K. Parhi, " An Obfuscated Radix-2 Real FFT Architecture ," Proc. of 40th IEEE International Conference on Acoustics, Speech and Signal Processing, April 2015.

77. Y. Lao, " Authentication and Obfuscation of Digital Signal Processing Integrated Circuits ," University of Minnesota, January 2015.

78. Y. Lao, " Removing redundancies of fast Fourier transform computations ," University of Minnesota, January 2015.

79. M. Parhi, Y. Lao, K. K. Parhi, " Canonic Real-Valued FFT Structures ," Proc. of Asilomar Conference on Signals, Systems and Computers, November 2014.

80. Q. Tang, B. Kim, Y. Lao, K. K. Parhi, C. H. Kim, " True Random Number Generator Circuits based on Single- and Multi-Phase Beat Frequency Detection ," Proc. of IEEE Customs Integrated Circuits Conference, pp. 1-4, September 2014.

81. Y. Lao, K. K. Parhi, " Protecting DSP Circuits Through Obfuscation ," Proc. of IEEE International Symposium on Circuits and Systems, pp. 798-801, June 2014.

82. Y. Lao, K. K. Parhi, " Protecting DSP circuits through obfuscation ," 2014 IEEE International Symposium on Circuits and Systems (ISCAS), 798-801, June 2014.

83. Y. Lao, K. K. Parhi, " Reconfigurable Architectures for Silicon Physical Unclonable Functions ," Proc. of IEEE International Conference on Electro Information Technology, pp. 1-7, May 2011.

84. Y. Lao, K. K. Parhi, " Novel Reconfigurable Silicon Physical Unclonable Functions ," Proc. of Workshop on Foundations of Dependable and Secure Cyber-Physical Systems, pp. 30-36, April 2011.

Journal Publications

1. J. Clements, Y. Lao, " Reliable Hardware Watermarks for Deep Learning Systems ," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, February 2024.

2. J. Sun, Y. Lao, " Efficient Data Extraction Circuit for Posit Number System: LDD-Based Posit Decoder ," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, December 2023.

3. W. Tan, S. Chiu, A. Wang, Y. Lao, K. K. Parhi, " PaReNTT: Low-latency parallel residue number system and NTT-based long polynomial modular multiplication for homomorphic encryption ," IEEE Transactions on Information Forensics and Security, December 2023.

4. B. Zhao, L. Qiu, Y. Lao, " Data-Driven Feature Selection Framework for Approximate Circuit Design ," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, March 2023.

5. W. Tan, A. Wang, X. Zhang, Y. Lao, K. Parhi, " High-speed VLSI architectures for modular polynomial multiplication via fast filtering and applications to lattice-based cryptography ," IEEE Transactions on Computers 72 (9), 2454-2466, March 2023.

6. F. B. Tarik, A. Famili, Y. Lao, J. D. Ryckman, " Scalable and CMOS Compatible Silicon Photonic Physical Unclonable Functions for Supply Chain Assurance ," Nanophotonics, 12(1), pp. 1-8, September 2022.

7. J. Sun, N. Sharma, J. Chakareski, N. Mastronarde, Y. Lao, " Hardware Acceleration for Post-Decision State Reinforcement Learning in IoT Systems ," IEEE Internet of Things Journal, 9(12), pp. 9889-9903, September 2022.

8. A. Wang, W. Tan, Y. Wen, Y. Lao, " NoPUF: A Novel PUF Design Framework Towards Modeling Attack ," IEEE Transactions on Circuits and Systems I, 68(6), pp. 2508-2521, September 2021.

9. W. Tan, B. Case, A. Wang, S. Gao, Y. Lao, " High-Speed Modular Multiplier for Lattice-Based Cryptosystems ," IEEE Transactions on Circuits and Systems II, 68(8), pp. 2927-2931, September 2021.

10. A. Wang, W. Tan, Y. Wen, Y. Lao, " NoPUF: A novel PUF design framework toward modeling attack resistant PUFs ," IEEE Transactions on Circuits and Systems I: Regular Papers 68 (6), 2508-2521, March 2021.

11. W. Tan, B. M. Case, A. Wang, S. Gao, Y. Lao, " High-speed modular multiplier for lattice-based cryptosystems ," IEEE Transactions on Circuits and Systems II: Express Briefs 68 (8), 2927-2931, March 2021.

12. W. Tan, B. Case, G. Hu, S. Gao, Y. Lao, " An Ultra-Highly Parallel Polynomial Multiplier for the Bootstrapping Algorithm in a Fully Homomorphic Encryption Scheme ," Journal of Signal Processing Systems, pp. 1-14, September 2020.

13. F. B. Tarik, A. Famili, Y. Lao, J. D. Ryckman, " Robust Optical Physical Unclonable Function Using Disordered Photonic Integrated Circuits ," Nanophotonics, 9(9), pp. 2817-2828, September 2020.

14. Y. Xu, Y. Lao, W. Liu, Z. Zhang, X. You, C. Zhang, " Mathematical Modeling Analysis of Strong Physical Unclonable Functions ," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 32(12), pp. 4426-4438, September 2020.

15. Y. Xu, Y. Lao, W. Liu, Z. Zhang, X. You, C. Zhang, " Mathematical modeling analysis of strong physical unclonable functions ," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, January 2020.

16. X. Zhang, Y. Lao, " On the Construction of Composite Finite Fields for Hardware Obfuscation ," IEEE Transactions on Computers, 68(9), pp. 1353-1364, September 2019.

17. Y. Lao, K. K. Parhi, " Canonic composite length real-valued FFT ," Journal of Signal Processing Systems 90, 1401-1414, October 2018.

18. Y. Lao, K. K. Parhi, " Canonic Composite Length Real-Valued FFT ," Journal of VLSI Signal Processing Systems, vol. 90, pp. 1401–1414, September 2018.

19. Y. Lao, K. K. Parhi, " Canonic FFT Flow-Graphs for Real-Valued Even/Odd Symmetric Inputs ," EURASIP Journal on Advances in Signal Processing, vol. 2017(1), p. 45, September 2017.

20. Y. Lao, B. Yuan, C. H. Kim, K. K. Parhi, " Reliable PUF-based Local Authentication with Self-Correction ," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 36(2), pp. 201-213, September 2017.

21. Y. Lao, B. Yuan, C. H. Kim, K. K. Parhi, " Reliable PUF-based local authentication with self-correction ," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, May 2016.

22. Y. Lao, K. K. Parhi, " Obfuscating DSP Circuits via High-Level Transformations ," IEEE Transactions on Very Large Scale Integration Systems, 23(5), pp. 819-830, September 2015. (IEEE CAS Society Very Large Scale Integration Best Paper Award).

23. Y. Lao, K. K. Parhi, " Statistical Analysis of MUX-based Physical Unclonable Functions ," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 33(5), pp. 649-662, September 2014.

24. Y. Lao, K. K. Parhi, " Obfuscating DSP circuits via high-level transformations ," IEEE transactions on very large scale integration (VLSI) systems 23 (5), 819-830, June 2014.

25. Y. Lao, K. K. Parhi, " Statistical analysis of MUX-based physical unclonable functions ," IEEE transactions on very large scale integration (VLSI) systems 23 (5), 819-830, June 2014.

26. M. Ayinala, Y. Lao, K. K. Parhi, " An In-Place FFT Architecture for Real-Valued Signals ," IEEE Transactions on Circuits and Systems II, 60(10), pp. 652-656, September 2013.