{"id":167,"date":"2020-08-18T19:58:35","date_gmt":"2020-08-18T19:58:35","guid":{"rendered":"http:\/\/dforte.ece.ufl.edu\/?page_id=167"},"modified":"2026-03-30T09:51:17","modified_gmt":"2026-03-30T14:51:17","slug":"research","status":"publish","type":"page","link":"https:\/\/faculty.eng.ufl.edu\/dforte\/research\/","title":{"rendered":"Research"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Current Research Thrusts<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><figure><a href=\"\/dforte\/research\/detection-and-avoidance-counterfeit-ics\/\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"243\" class=\"aligncenter wp-image-115\" src=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/counterfeit_high_res-300x243.jpg\" alt=\"Counterfeit ICs\" srcset=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/counterfeit_high_res-300x243.jpg 300w, https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/counterfeit_high_res-1024x828.jpg 1024w, https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/counterfeit_high_res-768x621.jpg 768w, https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/counterfeit_high_res.jpg 1144w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure> <a href=\"https:\/\/dforte.ece.ufl.edu\/research\/detection-and-avoidance-counterfeit-ics\/\">Detection and Avoidance of Counterfeit ICs and Components<\/a><\/td><td><figure><a href=\"https:\/\/dforte.ece.ufl.edu\/research\/hardware-security-primitives\/\"><img loading=\"lazy\" decoding=\"async\" width=\"217\" height=\"205\" class=\"aligncenter wp-image-135\" src=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/My_IC_FingerPrint.png\" alt=\"Hardware Primitives\"><\/a><\/figure> <a href=\"https:\/\/dforte.ece.ufl.edu\/research\/hardware-security-primitives\/\">Design and Fabrication of Hardware Security Primitives<\/a><\/td><td><figure><a href=\"\/dforte\/research\/security-assessment-and-mitigation\/\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"225\" class=\"aligncenter wp-image-117\" src=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/DSeRC-assessment-300x225.jpg\" alt=\"Security-aware EDA\" srcset=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/DSeRC-assessment-300x225.jpg 300w, https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/DSeRC-assessment-768x576.jpg 768w, https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/DSeRC-assessment-800x600.jpg 800w, https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/DSeRC-assessment.jpg 960w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure> <a href=\"https:\/\/dforte.ece.ufl.edu\/research\/security-assessment-and-mitigation\/\">Design Tools, Rules, and Metrics for Security Assessment and Mitigation<\/a><\/td><\/tr><tr><td><figure><a href=\"\/dforte\/research\/reverse-and-anti-reverse-engineering\/\"><img loading=\"lazy\" decoding=\"async\" width=\"230\" height=\"190\" class=\"aligncenter wp-image-123\" src=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/RE_230_186-1.jpg\" alt=\"Reverse Engineering\"><\/a><\/figure> <a href=\"https:\/\/dforte.ece.ufl.edu\/research\/reverse-and-anti-reverse-engineering\/\">Reverse and Anti-Reverse Engineering of Electronic Chips and Systems<\/a><\/td><td><figure><a href=\"\/dforte\/research\/hardware-trojan-detection-and-prevention\/\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"248\" class=\"aligncenter wp-image-131\" src=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/trojan_temperature-300x248.jpg\" alt=\"Hardware Trojans\" srcset=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/trojan_temperature-300x248.jpg 300w, https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/trojan_temperature-1024x847.jpg 1024w, https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/trojan_temperature-768x635.jpg 768w, https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/trojan_temperature.jpg 1141w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure> <a href=\"https:\/\/dforte.ece.ufl.edu\/research\/hardware-trojan-detection-and-prevention\/\">Hardware and Trojan Detection and Prevention<\/a><\/td><td><figure><a href=\"https:\/\/dforte.ece.ufl.edu\/research\/biometrics-and-hardware-in-the-iot-era\/\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"225\" class=\"aligncenter wp-image-179\" src=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/Biometrics_figure-300x225.jpg\" alt=\"AI, Biometrics, &amp; Hardware\" srcset=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/Biometrics_figure-300x225.jpg 300w, https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/Biometrics_figure-1024x768.jpg 1024w, https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/Biometrics_figure-768x576.jpg 768w, https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/Biometrics_figure-800x600.jpg 800w, https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/Biometrics_figure.jpg 1365w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure> <a href=\"https:\/\/dforte.ece.ufl.edu\/research\/biometrics-and-hardware-in-the-iot-era\/\">AI, Biometrics, Hardware in the IoT Era<\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><em>Note: The above images were created using images freely available on the web. If you have any issue with the pictures used, please contact me and I will remove them.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Past Research Thrusts<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><figure><a href=\"http:\/\/https:\/\/dforte.ece.ufl.edu\/research\/resource-constrained-video-compression-and-transmission\/\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"248\" class=\"aligncenter wp-image-127\" src=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/resource_video-300x248.jpg\" alt=\"Resource Constrained Video\" srcset=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/resource_video-300x248.jpg 300w, https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/resource_video-1024x847.jpg 1024w, https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/resource_video-768x635.jpg 768w, https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/resource_video.jpg 1141w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure> <a href=\"https:\/\/dforte.ece.ufl.edu\/research\/resource-constrained-video-compression-and-transmission\/\">Resource Constrained Video Compression and Transmission<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\"><img loading=\"lazy\" decoding=\"async\" width=\"1141\" height=\"944\" class=\"wp-image-125\" style=\"width: 150px\" src=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/resource_track.jpg\" alt=\"A display of two target silhouttes being tracked among many silhouttes by a system at the top. The bottom shows a battery, thermometer, and wifi logo\" srcset=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/resource_track.jpg 1141w, https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/resource_track-300x248.jpg 300w, https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/resource_track-1024x847.jpg 1024w, https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/resource_track-768x635.jpg 768w\" sizes=\"auto, (max-width: 1141px) 100vw, 1141px\" \/><br><br><br> <a href=\"https:\/\/dforte.ece.ufl.edu\/research\/resource-constrained-target-tracking-for-visual-sensor-networks\/\">Resource Constrained Target Tracking for Visual Sensor Networks<\/a><\/td><td><figure><a href=\"https:\/\/dforte.ece.ufl.edu\/research\/thermal-aware-state-estimation-in-distributed-sensor-networks\/\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"262\" class=\"aligncenter wp-image-139\" src=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/thermal_sensor-1-300x262.jpg\" alt=\"Sensor Networks\" srcset=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/thermal_sensor-1-300x262.jpg 300w, https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/thermal_sensor-1.jpg 421w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure> <a href=\"https:\/\/dforte.ece.ufl.edu\/research\/thermal-aware-state-estimation-in-distributed-sensor-networks\/\">Thermal-Aware State Estimation in Distributed Sensor Networks<\/a><\/td><td><figure><a href=\"https:\/\/dforte.ece.ufl.edu\/research\/green-video-on-demand-vod-for-large-scale-datacenters\/\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"247\" class=\"aligncenter wp-image-119\" src=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/green_VOD-300x247.jpg\" alt=\"Green Video on Demand\" srcset=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/green_VOD-300x247.jpg 300w, https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/green_VOD-1024x842.jpg 1024w, https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/green_VOD-768x632.jpg 768w, https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/green_VOD.jpg 1144w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/figure> <a href=\"https:\/\/dforte.ece.ufl.edu\/research\/green-video-on-demand-vod-for-large-scale-datacenters\/\">Green Video-on-Demand (VOD) for Large-Scale Datacenters<\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A summary of current and past research projects<\/p>\n","protected":false},"author":1381,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/page-section-nav.php","meta":{"_acf_changed":false,"inline_featured_image":false,"featured_post":"","footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-167","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-json\/wp\/v2\/pages\/167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-json\/wp\/v2\/users\/1381"}],"replies":[{"embeddable":true,"href":"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-json\/wp\/v2\/comments?post=167"}],"version-history":[{"count":6,"href":"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-json\/wp\/v2\/pages\/167\/revisions"}],"predecessor-version":[{"id":3271,"href":"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-json\/wp\/v2\/pages\/167\/revisions\/3271"}],"wp:attachment":[{"href":"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-json\/wp\/v2\/media?parent=167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}