skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Agarwal, S"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Free, publicly-accessible full text available August 13, 2026
  2. Free, publicly-accessible full text available April 1, 2026
  3. Amsaad, F; Abdelgawad, A; Jamil, A (Ed.)
    Fault Injection attack is a type of side-channel attack on the Physical Unclonable Function (PUF) module that can induce faults in the PUF response by manipulating the PUF circuit behavior through voltage glitches, laser attacks, temperature manipulations, or any other attacks potentially leading to information loss or security system failure. This type of attack exposes the physical characteristics of PUFs that can be analyzed to predict or compromise the unique challenge response pairs (CRPs) reducing the security and reliability of the PUF. Mitigation strategies against such attacks typically include adding noise to the PUF output, using error-correcting codes, or enhanced cryptographic protocols that obscure physical side-channel attacks. In this research, we propose a Generative Adversarial Network (GAN) based security model, that monitors the PUF behavior and detects the variations in PUF response. The model can detect glitches in the PUF response and generate alerts to take mitigation measures. 
    more » « less
    Free, publicly-accessible full text available February 25, 2026
  4. Videos of group interactions contain a wealth of information beyond the information directly communicated in a transcript of the discussion. Tracking who has participated throughout an extended interaction and what each of their trajectories has been in relation to one another is the foundation for joint activity understanding, though it comes with some unique challenges in videos of tightly coupled group work. Motivated by insights into the properties of such scenarios, including group composition and the properties of task-oriented, goal-directed tasks, we present a successful proof-of-concept. In particular, we present a transfer experiment to a dyadic robot construction task, an ablation study, and a qualitative analysis. 
    more » « less
  5. The Radio Neutrino Observatory in Greenland (RNO-G) is the first in-ice radio array in the northern hemisphere for the detection of ultra-high energy neutrinos via the coherent radio emission from neutrino-induced particle cascades within the ice. The array is currently in phased construction near Summit Station on the Greenland ice sheet, with 7 stations deployed during the first two boreal summer field seasons of 2021 and 2022. In this paper, we describe the installation and system design of these initial RNO-G stations, and discuss the performance of the array as of summer 2024. 
    more » « less
    Free, publicly-accessible full text available April 1, 2026
  6. Free, publicly-accessible full text available January 1, 2026
  7. null (Ed.)
  8. null (Ed.)