


Остановите войну!
for scientists:


default search action
Miodrag Potkonjak
Person information

- affiliation: University of California, Los Angeles, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – 2019
- 2019
- [j83]Teng Xu, Miodrag Potkonjak:
Circuit power optimization using pipelining and dual-supply voltage assignment. Integr. 65: 241-251 (2019) - [i3]Jia Guo, Miodrag Potkonjak:
Evolutionary Trigger Set Generation for DNN Black-Box Watermarking. CoRR abs/1906.04411 (2019) - 2018
- [c285]Hongxiang Gu, Miodrag Potkonjak:
Securing interconnected PUF network with reconfigurability. HOST 2018: 231-234 - [c284]Jia Guo, Miodrag Potkonjak:
Watermarking deep neural networks for embedded systems. ICCAD 2018: 133 - [c283]Hongxiang Gu, Miodrag Potkonjak:
Efficient and Secure Group Key Management in IoT using Multistage Interconnected PUF. ISLPED 2018: 8:1-8:6 - [c282]Jia Guo, Hongxiang Gu, Miodrag Potkonjak:
Efficient Image Sensor Subsampling for DNN-Based Image Classification. ISLPED 2018: 40:1-40:6 - [i2]Hongxiang Gu, Miodrag Potkonjak:
Efficient and Secure Group Key Management in IoT using Multistage Interconnected PUF. CoRR abs/1808.00664 (2018) - 2017
- [c281]Jia Guo, Miodrag Potkonjak:
Pruning ConvNets Online for Efficient Specialist Models. CVPR Workshops 2017: 430-437 - [c280]Miodrag Potkonjak, Gang Qu, Farinaz Koushanfar
, Chip-Hong Chang
:
20 Years of research on intellectual property protection. ISCAS 2017: 1-4 - [c279]Hongxiang Gu, Teng Xu, Miodrag Potkonjak:
A low-power APUF-based environmental abnormality detection framework. ISLPED 2017: 1-6 - [c278]Jia Guo, Miodrag Potkonjak:
Pruning Filters and Classes: Towards On-Device Customization of Convolutional Neural Networks. EMDL@MobiSys 2017: 13-17 - 2016
- [c277]Teng Xu, Miodrag Potkonjak:
Retiming and dual-supply voltage based energy optimization for DSP applications. ICASSP 2016: 1055-1059 - [c276]Teng Xu, Miodrag Potkonjak:
Energy-efficient fault tolerance approach for internet of things applications. ICCAD 2016: 62 - [c275]Hongxiang Gu, Teng Xu, Miodrag Potkonjak:
An Energy-Efficient PUF Design: Computing While Racing. ISLPED 2016: 142-147 - [c274]Teng Xu, Miodrag Potkonjak:
Pipelining for dual supply voltages. PATMOS 2016: 9-16 - [c273]Jia Guo, Miodrag Potkonjak:
Coarse-grained learning-based dynamic voltage frequency scaling for video decoding. PATMOS 2016: 84-91 - [c272]Jason Xin Zheng, Teng Xu, Miodrag Potkonjak:
Securing embedded systems and their IPs with digital reconfigurable PUFs. PATMOS 2016: 169-176 - [c271]Jia Guo, Teng Xu, Theano Stavrinos, Miodrag Potkonjak:
Enabling environmentally-powered indoor sensor networks with dynamic routing and operation. PATMOS 2016: 213-220 - [c270]Teng Xu, Hongxiang Gu, Miodrag Potkonjak:
An ultra-low energy PUF matching security platform using programmable delay lines. ReCoSoC 2016: 1-8 - 2015
- [j82]Azalia Mirhoseini, Miodrag Potkonjak, Farinaz Koushanfar
:
Phase Change Memory Write Cost Minimization by Data Encoding. IEEE J. Emerg. Sel. Topics Circuits Syst. 5(1): 51-63 (2015) - [j81]Jeyavijayan Rajendran, Ramesh Karri
, James B. Wendt, Miodrag Potkonjak, Nathan R. McDonald, Garrett S. Rose
, Bryant T. Wysocki:
Nano Meets Security: Exploring Nanoelectronic Devices for Security Applications. Proc. IEEE 103(5): 829-849 (2015) - [c269]Teng Xu, Dongfang Li, Miodrag Potkonjak:
Adaptive characterization and emulation of delay-based physical unclonable functions using statistical models. DAC 2015: 76:1-76:6 - [c268]Teng Xu, Hongxiang Gu, Miodrag Potkonjak:
Data protection using recursive inverse function. FPL 2015: 1-4 - [c267]James B. Wendt, Nathaniel A. Conos, Miodrag Potkonjak:
Multiple constant multiplication implementations in near-threshold computing systems. ICASSP 2015: 1071-1075 - [c266]Jia Guo, James B. Wendt, Miodrag Potkonjak:
Learning-Based Localized Offloading with Resource-Constrained Data Centers. ICCAC 2015: 212-215 - [c265]Miodrag Potkonjak, Deming Chen, Priyank Kalla, Steven P. Levitan:
DA Vision 2015: From Here to Eternity. ICCAD 2015: 271-277 - [c264]Teng Xu, Miodrag Potkonjak:
Energy Saving Using Scenario Based Sensor Selection on Medical Shoes. ICHI 2015: 398-403 - [c263]Teng Xu, Miodrag Potkonjak:
Stable and secure delay-based physical unclonable functions using device aging. ISCAS 2015: 33-36 - [c262]Teng Xu, Miodrag Potkonjak:
The digital bidirectional function as a hardware security primitive: Architecture and applications. ISLPED 2015: 335-340 - [c261]Teng Xu, Miodrag Potkonjak:
Digital PUF using intentional faults. ISQED 2015: 448-451 - [c260]Ethiopia Nigussie, Teng Xu, Miodrag Potkonjak:
Securing wireless body sensor networks using bijective function-based hardware primitive. ISSNIP 2015: 1-6 - [c259]Renchi Yan, Teng Xu, Miodrag Potkonjak:
Data integrity attacks and defenses for Intel lab sensor network. WF-IoT 2015: 721-726 - 2014
- [j80]Jong Hoon Ahnn, Miodrag Potkonjak:
VeSense: High-performance and energy-efficient vehicular sensing platform. Pervasive Mob. Comput. 12: 112-122 (2014) - [j79]Miodrag Potkonjak, Vishwa Goudar:
Public Physical Unclonable Functions. Proc. IEEE 102(8): 1142-1156 (2014) - [j78]Mahsan Rofouei, Miodrag Potkonjak, Majid Sarrafzadeh:
Energy Efficient Collaborative Sensing-Based Design: Soft Keyboard Case Study. IEEE Trans. Hum. Mach. Syst. 44(1): 115-124 (2014) - [j77]Sheng Wei, Miodrag Potkonjak:
Self-Consistency and Consistency-Based Detection and Diagnosis of Malicious Circuitry. IEEE Trans. Very Large Scale Integr. Syst. 22(9): 1845-1853 (2014) - [c258]Teng Xu, James B. Wendt, Miodrag Potkonjak:
Secure remote sensing and communication using digital pufs. ANCS 2014: 173-184 - [c257]Jason Xin Zheng, Miodrag Potkonjak:
A digital PUF-based IP protection architecture for network embedded systems. ANCS 2014: 255-256 - [c256]Nathaniel A. Conos, Saro Meguerdichian, Miodrag Potkonjak:
Coordinated and adaptive power gating and dynamic voltage scaling for energy minimization. ASAP 2014: 100-107 - [c255]Sheng Wei, James B. Wendt, Ani Nahapetian, Miodrag Potkonjak:
Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels. DAC 2014: 90:1-90:6 - [c254]James B. Wendt, Farinaz Koushanfar
, Miodrag Potkonjak:
Techniques for Foundry Identification. DAC 2014: 208:1-208:6 - [c253]Nathaniel A. Conos, Saro Meguerdichian, Foad Dabiri, Miodrag Potkonjak:
Provably minimal energy using coordinated DVS and power gating. DATE 2014: 1-6 - [c252]Masoud Rostami, James B. Wendt, Miodrag Potkonjak, Farinaz Koushanfar
:
Quo vadis, PUF?: Trends and challenges of emerging physical-disorder based security. DATE 2014: 1-6 - [c251]Vishwa Goudar, Miodrag Potkonjak:
A Robust Watermarking Technique for Secure Sharing of BASN Generated Medical Data. DCOSS 2014: 162-170 - [c250]Teng Xu, Miodrag Potkonjak:
Robust and flexible FPGA-based digital PUF. FPL 2014: 1-6 - [c249]Jason Xin Zheng, Dongfang Li, Miodrag Potkonjak:
A secure and unclonable embedded system using instruction-level PUF authentication. FPL 2014: 1-4 - [c248]James B. Wendt, Miodrag Potkonjak:
Hardware obfuscation using PUF-based logic. ICCAD 2014: 270-277 - [c247]Teng Xu, James B. Wendt, Miodrag Potkonjak:
Security of IoT systems: design challenges and opportunities. ICCAD 2014: 417-423 - [c246]Teng Xu, James B. Wendt, Miodrag Potkonjak:
Matched Digital PUFs for Low Power Security in Implantable Medical Devices. ICHI 2014: 33-38 - [c245]Vishwa Goudar, Miodrag Potkonjak:
On Admitting Sensor Fault Tolerance While Achieving Secure Biosignal Data Sharing. ICHI 2014: 266-275 - [c244]Renchi Yan, Vaibhav Chetan Shah, Teng Xu, Miodrag Potkonjak:
Security Defenses for Vulnerable Medical Sensor Network. ICHI 2014: 300-309 - [c243]Vishwa Goudar, Miodrag Potkonjak:
Addressing biosignal data sharing security issues with robust watermarking. SECON 2014: 618-626 - [c242]Vishwa Goudar, Miodrag Potkonjak:
Low-power semantic fault-detection in multi-sensory mobile health monitoring systems. WF-IoT 2014: 32-36 - [c241]Vishwa Goudar, James B. Wendt, Miodrag Potkonjak, Zhi Ren, Paul Brochu, Qibing Pei
:
Leveraging human gait characteristics towards self-sustained operation of low-power mobile devices. WF-IoT 2014: 468-473 - 2013
- [j76]Vishwa Goudar, Miodrag Potkonjak:
Fault-Tolerant and Low-Power Sampling Schedules for Localized BASNs. IEEE J. Emerg. Sel. Topics Circuits Syst. 3(1): 86-95 (2013) - [j75]Jong Hoon Ahnn, Miodrag Potkonjak:
mHealthMon: Toward Energy-Efficient and Distributed Mobile Health Monitoring Using Parallel Offloading. J. Medical Syst. 37(5): 9957 (2013) - [j74]Sheng Wei, Ani Nahapetian, Miodrag Potkonjak:
Quantitative Intellectual Property Protection Using Physical-Level Characterization. IEEE Trans. Inf. Forensics Secur. 8(11): 1722-1730 (2013) - [j73]Hyduke Noshadi, Foad Dabiri, Saro Meguerdichian, Miodrag Potkonjak, Majid Sarrafzadeh:
Behavior-oriented data resource management in medical sensing systems. ACM Trans. Sens. Networks 9(2): 12:1-12:26 (2013) - [c240]Garrett S. Rose
, Jeyavijayan Rajendran, Nathan R. McDonald, Ramesh Karri
, Miodrag Potkonjak, Bryant T. Wysocki:
Hardware security strategies exploiting nanoelectronic circuits. ASP-DAC 2013: 368-372 - [c239]Sheng Wei, Miodrag Potkonjak:
The undetectable and unprovable hardware trojan horse. DAC 2013: 144:1-144:2 - [c238]Jong Hoon Ahnn, Miodrag Potkonjak:
Toward energy-efficient and distributed mobile health monitoring using parallel offloading. EMBC 2013: 7257-7261 - [c237]Jong Hoon Ahnn, Miodrag Potkonjak:
Modeling Mobile Cloud Computing Using Greenmetrics. Feedback Computing 2013 - [c236]Sheng Wei, Jason Xin Zheng, Miodrag Potkonjak:
Low power FPGA design using post-silicon device aging (abstract only). FPGA 2013: 277 - [c235]Sheng Wei, Jason Xin Zheng, Miodrag Potkonjak:
Aging-based leakage energy reduction in FPGAs. FPL 2013: 1-4 - [c234]James B. Wendt, Miodrag Potkonjak:
The bidirectional polyomino partitioned PPUF as a hardware security primitive. GlobalSIP 2013: 257-260 - [c233]Sheng Wei, Miodrag Potkonjak:
Malicious circuitry detection using fast timing characterization via test points. HOST 2013: 113-118 - [c232]Nathaniel A. Conos, Miodrag Potkonjak:
A temperature-aware synthesis approach for simultaneous delay and leakage optimization. ICCD 2013: 316-321 - [c231]Teng Xu, James B. Wendt, Miodrag Potkonjak:
Digital bimodal function: An ultra-low energy security primitive. ISLPED 2013: 292-296 - [c230]Vishwa Goudar, Zhi Ren, Paul Brochu, Miodrag Potkonjak, Qibing Pei
:
Driving low-power wearable systems with an adaptively-controlled foot-strike scavenging platform. ISWC 2013: 135-136 - [c229]Nathaniel A. Conos, Saro Meguerdichian, Sheng Wei, Miodrag Potkonjak:
Maximizing yield in Near-Threshold Computing under the presence of process variation. PATMOS 2013: 1-8 - [c228]Vishwa Goudar, Zhi Ren, Paul Brochu, Qibing Pei
, Miodrag Potkonjak:
Optimizing the configuration and control of a novel human-powered energy harvesting system. PATMOS 2013: 75-82 - [c227]Nathaniel A. Conos, Saro Meguerdichian, Miodrag Potkonjak:
Gate Sizing Under Uncertainty. VLSI-SoC (Selected Papers) 2013: 23-47 - [c226]Nathaniel A. Conos, Saro Meguerdichian, Miodrag Potkonjak:
Gate sizing in the presence of gate switching activity and input vector control. VLSI-SoC 2013: 138-143 - [c225]Janusz Rajski, Miodrag Potkonjak, Adit D. Singh, Abhijit Chatterjee, Zain Navabi, Matthew R. Guthaus, Sezer Gören:
Embedded tutorials: Embedded tutorial 1: Cell-aware test-from gates to transistors. VLSI-SoC 2013 - [c224]Jong Hoon Ahnn, Miodrag Potkonjak:
VeSense: Energy-Efficient Vehicular Sensing. VTC Spring 2013: 1-5 - [c223]Sheng Wei, Jong Hoon Ahnn, Miodrag Potkonjak:
Energy attacks and defense techniques for wireless systems. WISEC 2013: 185-194 - 2012
- [j72]Miodrag Potkonjak, Ramesh Karri
, Ingrid Verbauwhede
, Kouichi Itoh:
Guest Editorial Integrated Circuit and System Security. IEEE Trans. Inf. Forensics Secur. 7(1): 1-2 (2012) - [j71]Sheng Wei, Ani Nahapetian, Michael Nelson, Farinaz Koushanfar
, Miodrag Potkonjak:
Gate Characterization Using Singular Value Decomposition: Foundations and Applications. IEEE Trans. Inf. Forensics Secur. 7(2): 765-773 (2012) - [j70]Sheng Wei, Miodrag Potkonjak:
Scalable Hardware Trojan Diagnosis. IEEE Trans. Very Large Scale Integr. Syst. 20(6): 1049-1057 (2012) - [c222]Azalia Mirhoseini, Miodrag Potkonjak, Farinaz Koushanfar
:
Coding-based energy minimization for phase change memory. DAC 2012: 68-76 - [c221]Sheng Wei, Kai Li, Farinaz Koushanfar
, Miodrag Potkonjak:
Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry. DAC 2012: 90-95 - [c220]Farinaz Koushanfar
, Saverio Fazzari, Carl McCants, William Bryson, Matthew Sale, Peilin Song, Miodrag Potkonjak:
Can EDA combat the rise of electronic counterfeiting? DAC 2012: 133-138 - [c219]Yu-Ting Chen, Jason Cong, Hui Huang, Bin Liu, Chunyue Liu, Miodrag Potkonjak, Glenn Reinman:
Dynamically reconfigurable hybrid cache: An energy-efficient last-level cache design. DATE 2012: 45-50 - [c218]Mahsan Rofouei, Mohammad Ali Ghodrat, Miodrag Potkonjak, Alfonso Martinez-Nova:
Optimization intensive energy harvesting. DATE 2012: 272-275 - [c217]James B. Wendt, Saro Meguerdichian, Hyduke Noshadi, Miodrag Potkonjak:
Energy and Cost Reduction in Localized Multisensory Systems through Application-Driven Compression. DCC 2012: 411 - [c216]Jason Xin Zheng, Miodrag Potkonjak:
Securing netlist-level FPGA design through exploiting process variation and degradation. FPGA 2012: 129-138 - [c215]Jason Xin Zheng, Ethan Chen, Miodrag Potkonjak:
A Benign Hardware Trojan on FPGA-based embedded systems. FPL 2012: 464-470 - [c214]Sheng Wei, Kai Li, Farinaz Koushanfar
, Miodrag Potkonjak:
Provably complete hardware Trojan detection using test point insertion. ICCAD 2012: 569-576 - [c213]Saro Meguerdichian, Miodrag Potkonjak:
Using standardized quantization for multi-party PPUF matching: Foundations and applications. ICCAD 2012: 577-584 - [c212]James B. Wendt, Saro Meguerdichian, Hyduke Noshadi, Miodrag Potkonjak:
Semantics-driven sensor configuration for energy reduction in medical sensor networks. ISLPED 2012: 303-308 - [c211]Jeyavijayan Rajendran, Garrett S. Rose
, Ramesh Karri
, Miodrag Potkonjak:
Nano-PPUF: A Memristor-Based Security Primitive. ISVLSI 2012: 84-87 - [c210]Vishwa Goudar, Miodrag Potkonjak:
Power constrained sensor sample selection for improved form factor and lifetime in localized BANs. Wireless Health 2012: 5:1-5:8 - [c209]Sheng Wei, Miodrag Potkonjak:
Wireless security techniques for coordinated manufacturing and on-line hardware trojan detection. WISEC 2012: 161-172 - [i1]Jeyavijayan Rajendran, Ramesh Karri, James B. Wendt, Miodrag Potkonjak, Nathan R. McDonald, Garrett S. Rose, Bryant T. Wysocki:
Nanoelectronic Solutions for Hardware Security. IACR Cryptol. ePrint Arch. 2012: 575 (2012) - 2011
- [j69]Sheng Wei, Saro Meguerdichian, Miodrag Potkonjak:
Malicious Circuitry Detection Using Thermal Conditioning. IEEE Trans. Inf. Forensics Secur. 6(3-2): 1136-1145 (2011) - [c208]Miodrag Potkonjak, Saro Meguerdichian, Ani Nahapetian, Sheng Wei:
Differential public physically unclonable functions: architecture and applications. DAC 2011: 242-247 - [c207]Sheng Wei, Miodrag Potkonjak:
Integrated circuit security techniques using variable supply voltage. DAC 2011: 248-253 - [c206]Saro Meguerdichian, Miodrag Potkonjak:
Device aging-based physically unclonable functions. DAC 2011: 288-289 - [c205]Sheng Wei, Farinaz Koushanfar
, Miodrag Potkonjak:
Integrated circuit digital rights management techniques using physical level characterization. Digital Rights Management Workshop 2011: 3-14 - [c204]Sheng Wei, Ani Nahapetian, Miodrag Potkonjak:
Robust passive hardware metering. ICCAD 2011: 802-809 - [c203]Saro Meguerdichian, Miodrag Potkonjak:
Matched public PUF: ultra low energy security platform. ISLPED 2011: 45-50 - [c202]Mahsan Rofouei, Miodrag Potkonjak, Majid Sarrafzadeh:
Energy efficient E-textile based portable keyboard. ISLPED 2011: 339-344 - [c201]Jong Hoon Ahnn, Miodrag Potkonjak:
What to read? With whom to work? Where to publish? - Scientific techniques for organizing and conducting engineering research. MSE 2011: 25-28 - [c200]Sheng Wei, Miodrag Potkonjak:
Scalable consistency-based hardware trojan detection and diagnosis. NSS 2011: 176-183 - 2010
- [j68]Miodrag Potkonjak:
Variability: For headache and profit. IEEE Des. Test Comput. 27(1): 96-98 (2010) - [j67]Milenko Drinic, Darko Kirovski, Lin Yuan, Gang Qu, Miodrag Potkonjak:
Field Division Routing. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j66]Tammara Massey, Gustavo Marfia
, Miodrag Potkonjak, Majid Sarrafzadeh:
Experimental analysis of a mobile health system for mood disorders. IEEE Trans. Inf. Technol. Biomed. 14(2): 241-247 (2010) - [j65]Farinaz Koushanfar
, Mehrdad Majzoobi, Miodrag Potkonjak:
Nonparametric combinatorial regression for shape constrained modeling. IEEE Trans. Signal Process. 58(2): 626-637 (2010) - [c199]Sheng Wei, Saro Meguerdichian, Miodrag Potkonjak:
Gate-level characterization: foundations and hardware security applications. DAC 2010: 222-227 - [c198]Miodrag Potkonjak:
Synthesis of trustable ICs using untrusted CAD tools. DAC 2010: 633-634 - [c197]Sheng Wei, Miodrag Potkonjak:
Scalable segmentation-based malicious circuitry detection and diagnosis. ICCAD 2010: 483-486 - [c196]Eun-Sook Sung, Miodrag Potkonjak:
A framework for optimization of operational latency in wireless networks. ISCC 2010: 235-240 - [c195]Alireza Vahdatpour, Miodrag Potkonjak:
Leakage minimization using self sensing and thermal management. ISLPED 2010: 265-270 - [c194]Eun-Sook Sung, Miodrag Potkonjak:
Optimized Operation for Infrastructure-Supported Wireless Sensor Networks. SECON 2010: 350-358 - [c193]Hyduke Noshadi, Foad Dabiri, Saro Meguerdichian, Miodrag Potkonjak, Majid Sarrafzadeh:
Energy optimization in wireless medical systems using physiological behavior. Wireless Health 2010: 128-136
2000 – 2009
- 2009
- [j64]Mehrdad Majzoobi, Farinaz Koushanfar
, Miodrag Potkonjak:
Techniques for Design and Implementation of Secure Reconfigurable PUFs. ACM Trans. Reconfigurable Technol. Syst. 2(1): 5:1-5:33 (2009) - [c192]Eun-Sook Sung, Miodrag Potkonjak:
Localized Probabilistic Routing for Data Gathering in Wireless Ad Hoc Networks. CNSR 2009: 356-363 - [c191]Eun-Sook Sung, Miodrag Potkonjak:
Energy Balancing Routing Schemes for Low-Power Wireless Networks. CNSR 2009: 408-415 - [c190]Miodrag Potkonjak, Ani Nahapetian, Michael Nelson, Tammara Massey:
Hardware Trojan horse detection using gate-level characterization. DAC