skip to main content


Search for: All records

Creators/Authors contains: "Pudukotai Dinakarrao, Sai Manoj"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Free, publicly-accessible full text available June 5, 2024
  2. Free, publicly-accessible full text available May 21, 2024
  3. In the past, epidemics such as AIDS, measles, SARS, H1N1 influenza, and tuberculosis caused the death of millions of people around the world. In response, intensive research is evolving to design efficient drugs and vaccines. However, studies warn that new pandemics such as Coronavirus (COVID-19), variants, and even deadly pandemics can emerge in the future. The existing epidemic confinement approaches rely on a large amount of available data to determine policies. Such dependencies could cause an irreversible effect before proper strategies are developed. Furthermore, the existing approaches follow a one-size-fits-all control technique, which might not be effective. To overcome this, in this work, we develop a game-theory-inspired approach that considers societal and economic impacts and formulates epidemic control as a non-zero-sum game. Further, the proposed approach considers the demographic information that provides a tailored solution to each demography. We explore different strategies, including masking, social distancing, contact tracing, quarantining, partial-, and full-lockdowns and their combinations, and present demography-aware optimal solutions to confine a pandemic with minimal history information and optimal impact on the economy. To facilitate scalability, we propose a novel graph learning approach, which learns from the previously obtained COVID-19 game outputs and mobility rates of one state (region) depending on the other to produce an optimal solution. Our optimal solution is strategized to restrict the mobility between states based on the impact they are causing on COVID-19 spread. We aim to control the COVID-19 spread by more than 50% and model a dynamic solution that can be applied to different strains of COVID-19. Real-world demographic conditions specific to each state are created, and an optimal strategic solution is obtained to reduce the infection rate in each state by more than 50%. 
    more » « less
  4. In the last decades, emerging and re-emerging epidemics such as AIDS, measles, SARS, HINI influenza, and tuberculosis cause death to millions of people each year. In response, a large and intensive research is evolving for the design of better drugs and vaccines. However, studies warn that the new pandemics such as Coronavirus (COVID-19) and even deadly pandemics can emerge in the future. The existing confinement approaches rely on large amount of available data to determine policies. Such dependencies could cause an irreversible effect before proper strategies are developed. Furthermore, the existing approaches follow a one-size fits all approach, which might not be effective. In contrast, we develop a game-theory inspired approach that considers societal and economic impacts and formulates the epidemic control as a non-zero sum dynamic game. Further, the proposed approach considers the demographic information leading to providing a tailored solution to each demography. We explore different strategies including masking, social distancing, contact tracing, quarantining, partial-, and full-lockdowns and their combinations and present demography-aware optimal solutions to confine a pandemic with minimal history information and optimal impact on economy. 
    more » « less
  5. null (Ed.)
    Circuit obfuscation is a recently proposed defense mechanism to protect the intellectual property (IP) of digital integrated circuits (ICs) from reverse engineering. There have been effective schemes, such as satisfiability (SAT)-checking based attacks that can potentially decrypt obfuscated circuits, which is called deobfuscation. Deobfuscation runtime could be days or years, depending on the layouts of the obfuscated ICs. Hence, accurately pre-estimating the deobfuscation runtime within a reasonable amount of time is crucial for IC designers to optimize their defense. However, it is challenging due to (1) the complexity of graph-structured circuit; (2) the varying-size topology of obfuscated circuits; (3) requirement on efficiency for deobfuscation method. This study proposes a framework that predicts the deobfuscation runtime based on graph deep learning techniques to address the challenges mentioned above. A conjunctive normal form (CNF) bipartite graph is utilized to characterize the complexity of this SAT problem by analyzing the SAT attack method. Multi-order information of the graph matrix is designed to identify the essential features and reduce the computational cost. To overcome the difficulty in capturing the dynamic size of the CNF graph, an energy-based kernel is proposed to aggregate dynamic features into an identical vector space. Then, we designed a framework, Deep Survival Analysis with Graph (DSAG), which integrates energy-based layers and predicts runtime inspired by censored regression in survival analysis. Integrating uncensored data with censored data, the proposed model improves the standard regression significantly. DSAG is an end-to-end framework that can automatically extract the determinant features for deobfuscation runtime. Extensive experiments on benchmarks demonstrate its effectiveness and efficiency. 
    more » « less
  6. Abstract—In this paper, we introduce DFSSD, a novel logic locking solution for sequential and FSM circuits with a restricted (locked) access to the scan chain. DFSSD combines two techniques for obfuscation: (1) Deep Faults, and (2) Shallow State Duality. Both techniques are specifically designed to resist against sequential SAT attacks based on bounded model checking. The shallow state duality prevents a sequential SAT attack from taking a shortcut for early termination without running an exhaustive unbounded model checker to assess if the attack could be terminated. The deep fault, on the other hand, provides a designer with a technique for building deep, yet key recoverable faults that could not be discovered by sequential SAT (and bounded model checker based) attacks in a reasonable time. 
    more » « less