default search action
William H. Robinson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c37]Semiu A. Olowogemo, Hao Qiu, Bor-Tyng Lin, William H. Robinson, Daniel B. Limbrick:
Model-Based Analysis of Single-Event Upset (SEU) Vulnerability of 6T SRAM Using FinFET Technologies. DFT 2022: 1-4 - [c36]Hao Qiu, Semiu A. Olowogemo, Bor-Tyng Lin, William H. Robinson, Daniel B. Limbrick:
Understanding time-varying vulnerability accross GPU Program Lifetime. DFT 2022: 1-6 - [c35]Hedin Beattie, Lanier A. Watkins, William H. Robinson, Aviel D. Rubin, Shari Watkins:
Measuring and Mitigating Bias in AI-Chatbots. ICAA 2022: 117-123 - 2021
- [c34]Hao Qiu, Bor-Tyng Lin, Semiu A. Olowogemo, William H. Robinson, Daniel B. Limbrick:
Evaluating Soft Error Mitigation Trade-offs During Early Design Stages. ARCS 2021: 213-228 - 2020
- [c33]Adrian Cartagena, Gerald Rimmer, Thomas van Dalsen, Lanier A. Watkins, William H. Robinson, Aviel D. Rubin:
Privacy Violating Opensource Intelligence Threat Evaluation Framework: A Security Assessment Framework For Critical Infrastructure Owners. CCWC 2020: 494-499 - [c32]Lanier A. Watkins, James Ballard, Kevin Hamilton, Jay Chow, Aviel D. Rubin, William H. Robinson, Cleon Davis:
Bio-Inspired, Host-based Firewall. CSE 2020: 86-91 - [c31]Hao Qiu, Xiaoxing Qiu, Semiu A. Olowogemo, Bor-Tyng Lin, William H. Robinson, Daniel B. Limbrick:
Gem5Panalyzer: A Light-weight tool for Early-stage Architectural Reliability Evaluation & Prediction. MWSCAS 2020: 482-485 - [c30]Semiu A. Olowogemo, Ahmed Yiwere, Bor-Tyng Lin, Hao Qiu, William H. Robinson, Daniel B. Limbrick:
Electrical Masking Improvement with Standard Logic Cell Synthesis Using 45 nm Technology Node. MWSCAS 2020: 619-622 - [c29]Lanier A. Watkins, Yue Yu, Sifan Li, William H. Robinson, Aviel D. Rubin:
Using Deep Learning to Identify Security Risks of Personal Mobile Devices in Enterprise Networks. UEMCON 2020: 292-297 - [c28]Lanier A. Watkins, Kevin D. Fairbanks, Chengyu Li, Mengdi Yang, William H. Robinson, Aviel D. Rubin:
A Black Box Approach to Inferring, Characterizing, and Breaking Native Device Tracking Autonomy. UEMCON 2020: 303-308
2010 – 2019
- 2019
- [j14]Xiaowen Wang, William H. Robinson:
Error Estimation and Error Reduction With Input-Vector Profiling for Timing Speculation in Digital Circuits. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 38(2): 385-389 (2019) - [c27]Semiu A. Olowogemo, William H. Robinson, Ahmed Yiwere, Ebenezer Tachie-Menson, Daniel B. Limbrick, Bor-Tyng Lin:
Pulse Broadening in Combinational Circuits with Standard Logic Cell Synthesis. MWSCAS 2019: 215-218 - 2018
- [c26]Lanier A. Watkins, Amritha Lal Kalathummarath, William H. Robinson:
Network-based detection of mobile malware exhibiting obfuscated or silent network behavior. CCNC 2018: 1-4 - [c25]Semiu A. Olowogemo, William H. Robinson, Daniel B. Limbrick:
Effects of Voltage and Temperature Variations on the Electrical Masking Capability of Sub-65 nm Combinational Logic Circuits. DFT 2018: 1-6 - 2017
- [j13]Trey Reece, Supreeth Sathyanarayana, William H. Robinson, Raheem A. Beyah:
On The Outside Looking In: Towards Detecting Counterfeit Devices Using Network Traffic Analysis. IEEE Trans. Multi Scale Comput. Syst. 3(1): 50-61 (2017) - [c24]Nikunj Malik, Jayanarayan Chandramouli, Prahlad Suresh, Kevin D. Fairbanks, Lanier A. Watkins, William H. Robinson:
Using network traffic to verify mobile device forensic artifacts. CCNC 2017: 1-6 - [c23]Nikunj Malik, Jayanarayan Chandramouli, Prahlad Suresh, Kevin D. Fairbanks, Lanier A. Watkins, William H. Robinson:
Using network traffic to verify mobile device forensic artifacts. CCNC 2017: 114-119 - [c22]Lanier A. Watkins, Sean Beck, Jared Zook, Anna L. Buczak, Jeffrey S. Chavis, William H. Robinson, Jose Andre Morales, Samuel Mishra:
Using semi-supervised machine learning to address the Big Data problem in DNS networks. CCWC 2017: 1-6 - [c21]Hao Qiu, Richard A. Peters, William H. Robinson, Daniel B. Limbrick:
The effects of radiation-induced soft errors on hardware implementations of object-tracking algorithms. MWSCAS 2017: 393-396 - [c20]Forest C. Mead, Jeffrey M. Zielinski, Lanier A. Watkins, William H. Robinson:
A mobile two-way wireless covert timing channel suitable for peer-to-peer malware. PIMRC 2017: 1-6 - 2016
- [j12]William H. Robinson, Ebony O. McGee, Lydia C. Bentley, Stacey L. Houston II, Portia K. Botchway:
Addressing Negative Racial and Gendered Experiences That Discourage Academic Careers in Engineering. Comput. Sci. Eng. 18(2): 29-39 (2016) - [j11]Trey Reece, William H. Robinson:
Detection of Hardware Trojans in Third-Party Intellectual Property Using Untrusted Modules. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 35(3): 357-366 (2016) - [c19]Xiaowen Wang, William H. Robinson:
A Dual-Threshold Voltage Approach for Timing Speculation in CMOS Circuits. ISVLSI 2016: 691-696 - [c18]Michael Hooper, Yifan Tian, Runxuan Zhou, Bin Cao, Adrian P. Lauf, Lanier A. Watkins, William H. Robinson, Wlajimir Alexis:
Securing commercial WiFi-based UAVs from common security attacks. MILCOM 2016: 1213-1218 - [e1]William H. Robinson, Swarup Bhunia, Ryan Kastner:
2016 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2016, McLean, VA, USA, May 3-5, 2016. IEEE Computer Society 2016, ISBN 978-1-4673-8826-9 [contents] - 2015
- [j10]Lanier A. Watkins, William H. Robinson, Raheem A. Beyah:
Using Network Traffic to Infer Hardware State: A Kernel-Level Investigation. ACM Trans. Embed. Comput. Syst. 14(3): 55:1-55:22 (2015) - [j9]Bradley T. Kiddie, William H. Robinson, Daniel B. Limbrick:
Single-Event Multiple-Transient Characterization and Mitigation via Alternative Standard Cell Placement Methods. ACM Trans. Design Autom. Electr. Syst. 20(4): 60:1-60:22 (2015) - [c17]Georgios Lontorfos, Kevin D. Fairbanks, Lanier A. Watkins, William H. Robinson:
Remotely inferring device manipulation of industrial control systems via network behavior. LCN Workshops 2015: 603-610 - [c16]Lanier A. Watkins, Kurt Silberberg, Jose Andre Morales, William H. Robinson:
Using inherent command and control vulnerabilities to halt DDoS attacks. MALWARE 2015: 3-10 - [c15]Timothy Potteiger, William H. Robinson:
A one Zener diode, one memristor crossbar architecture for a write-time-based PUF. MWSCAS 2015: 1-4 - 2014
- [c14]Mengchao Yue, William H. Robinson, Lanier A. Watkins, Cherita L. Corbett:
Constructing timing-based covert channels in mobile networks by adjusting CPU frequency. HASP@ISCA 2014: 2:1-2:8 - [c13]Lingbo Kou, William H. Robinson:
Impact of Process Variations on Reliability and Performance of 32-nm 6T SRAM at Near Threshold Voltage. ISVLSI 2014: 214-219 - [c12]Bradley T. Kiddie, William H. Robinson:
Alternative Standard Cell Placement Strategies for Single-Event Multiple-Transient Mitigation. ISVLSI 2014: 589-594 - [c11]Lanier A. Watkins, Christina Kawka, Cherita L. Corbett, William H. Robinson:
Fighting banking botnets by exploiting inherent command and control vulnerabilities. MALWARE 2014: 93-100 - [c10]Trey Reece, Bradley T. Kiddie, William H. Robinson:
Identification of Trojans in an FPGA using low-precision equipment. MWSCAS 2014: 306-309 - 2013
- [j8]Dan Burger, Keivan G. Stassun, Joshua A. Pepper, Robert J. Siverd, Martin A. Paegert, Nathan M. De Lee, William H. Robinson:
Filtergraph: An interactive web application for visualization of astronomy datasets. Astron. Comput. 2: 40-45 (2013) - [j7]William H. Robinson, Adrian P. Lauf:
Aerial MANETs: Developing a Resilient and Efficient Platform for Search and Rescue Applications. J. Commun. 8(4): 216-224 (2013) - [j6]Nihaar N. Mahatme, Indranil Chatterjee, Akash Patki, Daniel B. Limbrick, Bharat L. Bhuva, Ronald D. Schrimpf, William H. Robinson:
An efficient technique to select logic nodes for single event transient pulse-width reduction. Microelectron. Reliab. 53(1): 114-117 (2013) - [j5]Xiaowen Wang, William H. Robinson:
Asynchronous Data Sampling Within Clock-Gated Double Edge-Triggered Flip-Flops. IEEE Trans. Circuits Syst. I Regul. Pap. 60-I(9): 2401-2411 (2013) - [c9]William H. Robinson, Adrian P. Lauf:
Resilient and efficient MANET aerial communications for search and rescue applications. ICNC 2013: 845-849 - [c8]Qian Ding, Trey Reece, William H. Robinson:
Timing analysis in software and hardware to implement NIST elliptic curves over prime fields. MWSCAS 2013: 1358-1362 - 2012
- [c7]Trey Reece, Daniel B. Limbrick, Xiaowen Wang, Bradley T. Kiddie, William H. Robinson:
Stealth assessment of hardware Trojans in a microcontroller. ICCD 2012: 139-142 - 2011
- [j4]Lanier A. Watkins, William H. Robinson, Raheem A. Beyah:
A Passive Solution to the CPU Resource Discovery Problem in Cluster Grid Networks. IEEE Trans. Parallel Distributed Syst. 22(12): 2000-2007 (2011) - [c6]Daniel B. Limbrick, Suge Yue, William H. Robinson, Bharat L. Bhuva:
Impact of Synthesis Constraints on Error Propagation Probability of Digital Circuits. DFT 2011: 103-111 - [c5]Trey Reece, William H. Robinson:
Hardware Trojans: The defense and attack of integrated circuits. ICCD 2011: 293-296 - [c4]Trey Reece, Daniel B. Limbrick, William H. Robinson:
Design Comparison to Identify Malicious Hardware in External Intellectual Property. TrustCom 2011: 639-646 - 2010
- [j3]Adrian P. Lauf, Richard A. Peters, William H. Robinson:
A distributed intrusion detection system for resource-constrained devices in ad-hoc networks. Ad Hoc Networks 8(3): 253-266 (2010) - [j2]Lanier A. Watkins, William H. Robinson, Raheem A. Beyah:
A Passive Solution to the Memory Resource Discovery Problem in Computational Clusters. IEEE Trans. Netw. Serv. Manag. 7(4): 218-230 (2010)
2000 – 2009
- 2009
- [c3]Adrian P. Lauf, William H. Robinson:
Fault Tolerance in MANETs Using a Task-to-Resource Reallocation Framework. CSE (2) 2009: 753-758 - 2007
- [c2]Adrian P. Lauf, Richard A. Peters, William H. Robinson:
Embedded Intelligent Intrusion Detection: A Behavior-Based Approach. AINA Workshops (1) 2007: 816-821 - 2005
- [j1]William H. Robinson, D. Scott Wills:
Efficiency Analysis for a Mixed-Signal Focal Plane Processing Architecture. J. VLSI Signal Process. 41(1): 65-80 (2005) - 2001
- [c1]William H. Robinson, D. Scott Wills:
Cost Modeling or Early Image Processing Applications. Workshop on Digital and Computational Video 2001: 29-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint