| 
                        AI Security                                                LSTM-Based System-Call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems, arXiv preprint arXiv:1611.01726, Nov 2016
                                                                                                                    
                 | 
                            
                    | 
                        Mobile Cloud Computing                                                Optimization Techniques to Enable Execution Offloading for 3D Video Games, Multimedia Tools and Applications(MTAP), Jul 2016
                                                                                                                    
                 | 
                            
                    | 
                        Application Specific Architectures                                                Development of Custom Digital Signal Processor for Finger Recognition Vision Application, International Conference on Ubiquitous Computing Application and Wireless Sensor Network, Jul 2016
                                                                                                                    
                 | 
                            
                    | 
                        SW Security                                                A Survey and Design of a Scalable Mobile Edge Cloud Platform for the Smart IoT Devices and It’s Applications, International Conference on Computer Science and its Applications, 694-698, Nov 2016
                                                                                                                    
                 | 
                            
                    | 
                        HW Security                                                A Hardware-based Technique for Efficient Implicit Information Flow Tracking, International Conference on Computer Aided Design (ICCAD), Nov. 2016 (Acceptance rate: 23%)
                                                                                                                    
                 | 
                            
                    | 
                        HW Security                                                Efficient Security Monitoring with Core Debug Interface in an Embedded Processor, ACM Transactions on Design Automation of Electronic Systems (TODAES), Dec 2016
                                                                                                                    
                 | 
                            
                    | 
                        SW Security                                                Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices, USENIX Annual Technical Conference(ATC), Jun 2016 (Acceptance rate: 19%)
                                                                                                                    
                 | 
                            
                    | 
                        HW Security                                                Architectural Supports to Protect OS Kernels from Code-Injection Attacks Hardware and Architectural Support for Security and Privacy (HASP), Jun 2016
                                                                                                                    
                 | 
                            
                    | 
                        HW Security                                                A Hardware-based Technique for Efficient Implicit Information Flow Tracking, Design Automation Conference (DAC) WIP, Jun 2016
                                                                                                                    
                 | 
                            
                    | 
                        HW Security                                                HDFI: Hardware-Assisted Data-flow Isolation, IEEE S&P , May 2016 (Acceptance rate: 13.3%)
                                                                                                                    
                 | 
                            
                    | 
                        HW Security                                                Integration of ROP/JOP Monitoring IPs in an ARM-based SoC Design Automation and Test in Europe Conference and Exhibition (DATE), Mar 2016 (Acceptance rate: 24%)
                                                                                                                    
                 | 
                            
                    | 
                        Mobile Cloud Computing                                                Energy-Reduction Offloading Technique for Streaming Media Servers, Mobile Information Systems, Mar 2016
                                                                                                                    
                 | 
                            
                    | 
                        Application Specific Architectures                                                Software-based Selective Validation Techniques for Robust CGRAs against Soft Errors, Transactions on Embedded Computing Systems, VOL.15, NO.20, Feb 2016
                                                                                                                    
                 | 
                            
                    | 
                        HW Security                                                3D User Signature System Using Location Tracking Techniques, Global IT Conference, Jan 2016
                                                                                                                    
                 | 
                            
                    | 
                        Mobile Cloud Computing                                                Energy Consumption Reduction Technique on Smart Devices for Communication-intensive Applications, Ubiquitous Information Techniques and Applications(CUTE), Dec 2015
                                                                                                                    
                 | 
                            
                    | 
                        Mobile Cloud Computing                                                An Effective Cloud Solution to Ensure the Integrity of Mobile Application via Execution Offloading, International Conference on Network, Communication and Computing(ICNCC), Dec 2015
                                                                                                                    
                 | 
                            
                    | 
                        Application Specific Architectures                                                Scalable Application Mapping for SIMD Reconfigurable Architecture, JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, VOL.15, NO.6, JSTS, Dec 2015
                                                                                                                    
                 | 
                            
                    | 
                        HW Security                                                The new real-time debug interface for efficient code reuse attack detection, 2015 International SoC Design Conference (ISOCC), 93-94, Nov 2015
                                                                                                                    
                 | 
                            
                    | 
                        HW Security                                                Implementing an Application-Specific Instruction-Set Processor for System-Level Dynamic Program Analysis Engines, ACM Transactions on Design Automation of Electronic Systems (TODAES), Sep 2015
                                                                                                                    
                 | 
                            
                    | 
                        HW Security                                                Accelerating Bootstrapping in FHEW using GPUs, The 26th IEEE International Conference on Application-specific Systems, Architectures and Processors, IEEE ASAP Conference, Jul 2015(Acceptance rate: 24.7%)
                                                                                                                    
                 |