Nima Karimian
YOU?
Author Swipe
View article: Understanding ChatGPT: Impact Analysis and Path Forward for Teaching Computer Science and Engineering
Understanding ChatGPT: Impact Analysis and Path Forward for Teaching Computer Science and Engineering Open
Large Language Models (LLMs) like ChatGPT have become the most popular regenerative AI applications, used for obtaining responses for queries in different domains. The responses of ChatGPT are already becoming mainstream and are challengin…
View article: Contactless Fingerprint Biometric Anti-Spoofing: An Unsupervised Deep Learning Approach
Contactless Fingerprint Biometric Anti-Spoofing: An Unsupervised Deep Learning Approach Open
This paper presents a novel unsupervised deep learning approach for contactless fingerprint biometric anti-spoofing. Traditional presentation attack detection (PAD) methods rely on supervised learning techniques, utilizing both bonafide an…
View article: Advancements in Continuous Glucose Monitoring: Integrating Deep Learning and ECG Signal
Advancements in Continuous Glucose Monitoring: Integrating Deep Learning and ECG Signal Open
This paper presents a novel approach to noninvasive hyperglycemia monitoring utilizing electrocardiograms (ECG) from an extensive database comprising 1119 subjects. Previous research on hyperglycemia or glucose detection using ECG has been…
View article: Contactless Fingerprint Biometric Anti-Spoofing: An Unsupervised Deep Learning Approach
Contactless Fingerprint Biometric Anti-Spoofing: An Unsupervised Deep Learning Approach Open
Contactless fingerprint recognition offers a higher level of user comfort and addresses hygiene concerns more effectively. However, it is also more vulnerable to presentation attacks such as photo paper, paper-printout, and various display…
View article: A Universal Anti-Spoofing Approach for Contactless Fingerprint Biometric Systems
A Universal Anti-Spoofing Approach for Contactless Fingerprint Biometric Systems Open
With the increasing integration of smartphones into our daily lives, fingerphotos are becoming a potential contactless authentication method. While it offers convenience, it is also more vulnerable to spoofing using various presentation at…
View article: Understanding ChatGPT: Impact Analysis and Path Forward for Teaching Computer Science and Engineering
Understanding ChatGPT: Impact Analysis and Path Forward for Teaching Computer Science and Engineering Open
ChatGPT has become the most popular regenerative AI application, used for obtaining responses for queries in different domains. Some responses of ChatGPT reported in the internet are accurate, others are funny, and some are fictitious. Thi…
View article: Understanding ChatGPT: Impact Analysis and Path Forward for Teaching Computer Science and Engineering
Understanding ChatGPT: Impact Analysis and Path Forward for Teaching Computer Science and Engineering Open
ChatGPT has become the most popular regenerative AI application, used for obtaining responses for queries in different domains. Some responses of ChatGPT reported in the internet are accurate, others are funny, and some are fictitious. Thi…
View article: Never Lose Your ECG: A Novel Key Generation and Authentication Scheme for Implantable Medical Devices
Never Lose Your ECG: A Novel Key Generation and Authentication Scheme for Implantable Medical Devices Open
Implantable medical devices, such as pacemakers, cardiac defibrillators, and insulin pumps, play a crucial role in monitoring patients' vital signs within healthcare systems. However, these networked devices are susceptible to external att…
View article: Intrinsic PUF Instance on Non-Volatile NAND Flash Memory
Intrinsic PUF Instance on Non-Volatile NAND Flash Memory Open
Embedded systems or micro controller based modules have become increasingly prevalent in our daily lives. However, the security of embedded devices as well as the authenticity of hardware has become an increasing concern within the growing…
View article: Hyperglycemia Identification Using ECG in Deep Learning Era
Hyperglycemia Identification Using ECG in Deep Learning Era Open
A growing number of smart wearable biosensors are operating in the medical IoT environment and those that capture physiological signals have received special attention. Electrocardiogram (ECG) is one of the physiological signals used in th…
View article: Flash-Based Security Primitives: Evolution, Challenges and Future Directions
Flash-Based Security Primitives: Evolution, Challenges and Future Directions Open
Over the last two decades, hardware security has gained increasing attention in academia and industry. Flash memory has been given a spotlight in recent years, with the question of whether or not it can prove useful in a security role. Bec…
View article: When Physical Unclonable Function Meets Biometrics
When Physical Unclonable Function Meets Biometrics Open
As the Covid-19 pandemic grips the world, healthcare systems are being reshaped, where the e-health concepts become more likely to be accepted. Wearable devices often carry sensitive information from users which are exposed to security and…
View article: ECG Biometric Authentication: A Comparative Analysis
ECG Biometric Authentication: A Comparative Analysis Open
Robust authentication and identification methods become an indispensable urgent task to protect the integrity of the devices and the sensitive data. Passwords have provided access control and authentication, but have shown their inherent v…
View article: DRAMNet: Authentication based on Physical Unique Features of DRAM Using Deep Convolutional Neural Networks
DRAMNet: Authentication based on Physical Unique Features of DRAM Using Deep Convolutional Neural Networks Open
Nowadays, there is an increasing interest in the development of Autonomous Vehicles (AV). However, there are two types of attack challenges that can affect AVs and are yet to be resolved, i.e., sensor attacks and vehicle access attacks. Th…
View article: Unlock Your Heart: Next Generation Biometric in Resource-Constrained Healthcare Systems and IoT
Unlock Your Heart: Next Generation Biometric in Resource-Constrained Healthcare Systems and IoT Open
With the emergence of the Internet-of-Things, there is a growing need for access control and data protection on low-power, pervasive devices. Key-based biometric cryptosystems are promising for IoT due to its convenient nature and lower su…
View article: Secure and Reliable Biometric Access Control for Resource-Constrained Systems and IoT
Secure and Reliable Biometric Access Control for Resource-Constrained Systems and IoT Open
With the emergence of the Internet-of-Things (IoT), there is a growing need for access control and data protection on low-power, pervasive devices. Biometric-based authentication is promising for IoT due to its convenient nature and lower …
View article: Deep RNN-Oriented Paradigm Shift through BOCANet: Broken Obfuscated Circuit Attack
Deep RNN-Oriented Paradigm Shift through BOCANet: Broken Obfuscated Circuit Attack Open
This is the first work augmenting hardware attacks mounted on obfuscated circuits by incorporating deep recurrent neural network (D-RNN). Logic encryption obfuscation has been used for thwarting counterfeiting, overproduction, and reverse …