Zobrazeno 1 - 10
of 181
pro vyhledávání: '"P, Sai Manoj"'
The increasing complexity of modern processor and IP designs presents significant challenges in identifying and mitigating hardware flaws early in the IC design cycle. Traditional hardware fuzzing techniques, inspired by software testing, have shown
Externí odkaz:
http://arxiv.org/abs/2412.13374
Autor:
Sun, Heng, Jalam, Sai Manoj, Kodali, Havish, Nerella, Subhash, Zapata, Ruben D., Gravina, Nicole, Ray, Jessica, Schmidt, Erik C., Manini, Todd Matthew, Parisa, Rashidi
Mobile health (mHealth) apps have gained popularity over the past decade for patient health monitoring, yet their potential for timely intervention is underutilized due to limited integration with electronic health records (EHR) systems. Current EHR
Externí odkaz:
http://arxiv.org/abs/2410.21507
In this paper, we present a novel, scalable approach for constructing open set, instance-level 3D scene representations, advancing open world understanding of 3D environments. Existing methods require pre-constructed 3D scenes and face scalability is
Externí odkaz:
http://arxiv.org/abs/2407.14279
The widespread integration of embedded systems across various industries has facilitated seamless connectivity among devices and bolstered computational capabilities. Despite their extensive applications, embedded systems encounter significant securi
Externí odkaz:
http://arxiv.org/abs/2404.08818
The widespread integration of IoT devices has greatly improved connectivity and computational capabilities, facilitating seamless communication across networks. Despite their global deployment, IoT devices are frequently targeted for security breache
Externí odkaz:
http://arxiv.org/abs/2404.08808
In recent years, networked IoT systems have revolutionized connectivity, portability, and functionality, offering a myriad of advantages. However, these systems are increasingly targeted by adversaries due to inherent security vulnerabilities and lim
Externí odkaz:
http://arxiv.org/abs/2404.10012
Autor:
Kasarapu, Sreenitha, Shukla, Sanket, Hassan, Rakibul, Sasan, Avesta, Homayoun, Houman, Dinakarrao, Sai Manoj Pudukotai
One of the pivotal security threats for the embedded computing systems is malicious software a.k.a malware. With efficiency and efficacy, Machine Learning (ML) has been widely adopted for malware detection in recent times. Despite being efficient, th
Externí odkaz:
http://arxiv.org/abs/2404.02344
In recent years, there has been a notable surge in attention towards hardware security, driven by the increasing complexity and integration of processors, SoCs, and third-party IPs aimed at delivering advanced solutions. However, this complexity also
Externí odkaz:
http://arxiv.org/abs/2403.12812
Publikováno v:
IEEE Robotics and Automation Letters, vol. 9, no. 2, pp. 955-962, Feb. 2024
Global visual localization estimates the absolute pose of a camera using a single image, in a previously mapped area. Obtaining the pose from a single image enables many robotics and augmented/virtual reality applications. Inspired by latest advances
Externí odkaz:
http://arxiv.org/abs/2312.02029
Autor:
Nageswara Rao Gali, Panduranga Vital Terlapu, Yasaswini Mandavakuriti, Sai Manoj Somu, Madhavi Varanasi, Vijay Telugu, Maheswara Rao V V R
Publikováno v:
Proceedings on Engineering Sciences, Vol 6, Iss 4, Pp 1731-1740 (2024)
Breast cancer (BC) ranks the second most prevalent cancer among women globally and is the leading cause of female mortality. The conventional method for BC detection primarily relies on biopsy; this might be time-consuming and error prone. The substa
Externí odkaz:
https://doaj.org/article/1b921bfab8ef4ec7a70d1612394d57df