IoT security, privacy and trust in home-sharing economy via blockchain

MN Islam, S Kundu - Blockchain Cybersecurity, Trust and Privacy, 2020 - Springer
The phenomenal growth of Internet-services has created a vibrant new domain for sharing
economy. Millions of users around the world share personal services and possessions with …

INSPECT: Investigating Supply Chain and Cyber-Physical Security of Battery Systems

T Zhang, S Shi, MH Rahman, N Varshney… - Cryptology ePrint …, 2024 - eprint.iacr.org
Battery-operated applications have been ubiquitous all over the world ranging from power-
intensive electric cars down to low-power smart terminals and embedded devices …

In-Memory Compute with Off-the-Shelf DRAMs and Efficient On-Chip Data Supply for Heterogeneous SoCs

F Gao - 2024 - search.proquest.com
In-memory computing has long been promised as a solution to the “Memory Wall” problem.
Unfortunately, performing computations with memory resources either has relied on …

[PDF][PDF] First demonstration of reconfigurable and low-power strong physical unclonable function empowered by FeFET cycle-to-cycle variation

X Li, X Guo, T Li, F Müller, S Abdulazhanov, X Ma… - 2024 - assets-eu.researchsquare.com
Physical unclonable functions (PUFs) are of immense potential in authentication
applications for 16 numerous Internet of Things (IoT) devices. For creditable and lightweight …

Self Adaptive Reinforcement Learning for High-Dimensional Stochastic Systems with Application to Robotic Control

SJA Raza - 2021 - stars.library.ucf.edu
A long standing goal in the field of artificial intelligence (AI) is to develop agents that can
perceive richer problem space and effortlessly plan their activity in minimal duration. Several …