Security of IoT Systems: Design Challenges and Opportunities T Xu, JB Wendt, M Potkonjak IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 417-423, 2014 | 540 | 2014 |
Template-based identification of user interest J Wendt, J Yang, Y Sheng, J Xie, LG Pueyo US Patent 10,387,559, 2019 | 188 | 2019 |
Representation Learning for Information Extraction from Form-like Documents BP Majumder, N Potti, S Tata, JB Wendt, Q Zhao, M Najork Proceedings of the 58th Annual Meeting of the Association for Computational …, 2020 | 136 | 2020 |
Nano Meets Security: Exploring Nanoelectronic Devices for Security Applications J Rajendran, R Karri, JB Wendt, M Potkonjak, N McDonald, GS Rose, ... Proceedings of the IEEE 103 (5), 829-849, 2015 | 134 | 2015 |
Hardware obfuscation using PUF-based logic JB Wendt, M Potkonjak Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided …, 2014 | 112 | 2014 |
Tsunamis and splay fault dynamics J Wendt, DD Oglesby, EL Geist Geophysical Research Letters 36 (15), 2009 | 83 | 2009 |
Template-based structured document classification and extraction Y Sheng, Y Lu, J Xie, J Yang, LG Pueyo, J Lou, J Wendt US Patent 10,657,158, 2020 | 61 | 2020 |
Quo vadis, PUF?: trends and challenges of emerging physical-disorder based security M Rostami, JB Wendt, M Potkonjak, F Koushanfar 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2014 | 61 | 2014 |
Nanotechnology-Based Trusted Remote Sensing JB Wendt, M Potkonjak IEEE Sensors, 1213-1216, 2011 | 46 | 2011 |
Nanoelectronic Solutions for Hardware Security J Rajendran, R Karri, JB Wendt, B Wysocki Cryptography ePrint Archive, 2012 | 43 | 2012 |
Hierarchical Label Propagation and Discovery for Machine Generated Email JB Wendt, M Bendersky, L Garcia-Pueyo, V Josifovski, B Miklos, I Krka, ... Proceedings of the Ninth ACM International Conference on Web Search and Data …, 2016 | 33 | 2016 |
Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels S Wei, JB Wendt, A Nahapetian, M Potkonjak Proceedings of the 51st Annual Design Automation Conference, 1-6, 2014 | 32 | 2014 |
Digital Bimodal Function: An Ultra-Low Energy Security Primitive T Xu, JB Wendt, M Potkonjak ACM/IEEE International Symposium on Low Power Electronics and Design, 292-297, 2013 | 32 | 2013 |
Secure remote sensing and communication using digital PUFs T Xu, JB Wendt, M Potkonjak Proceedings of the tenth ACM/IEEE symposium on Architectures for networking …, 2014 | 29 | 2014 |
Techniques for foundry identification JB Wendt, F Koushanfar, M Potkonjak Proceedings of the 51st Annual Design Automation Conference, 1-6, 2014 | 29 | 2014 |
Matched digital PUFs for low power security in implantable medical devices T Xu, JB Wendt, M Potkonjak 2014 IEEE International Conference on Healthcare Informatics, 33-38, 2014 | 28 | 2014 |
The Bidirectional Polyomino Partitioned PPUF as a Hardware Security Primitive JB Wendt, M Potkonjak Global Conference on Signal and Information Processing (GlobalSIP), 257-260, 2013 | 26 | 2013 |
Medical Diagnostic-Based Sensor Selection JB Wendt, M Potkonjak IEEE Sensors, 1507-1510, 2011 | 25 | 2011 |
Glean: Structured Extractions from Templatic Documents S Tata, N Potti, JB Wendt, LB Costa, M Najork, B Gunel Proceedings of the VLDB Endowment 14 (6), 997-1005, 2021 | 20 | 2021 |
Anatomy of a Privacy-Safe Large-Scale Information Extraction System Over Email Y Sheng, S Tata, JB Wendt, J Xie, Q Zhao, M Najork Proceedings of the 24th ACM SIGKDD International Conference on Knowledge …, 2018 | 20 | 2018 |