{"id":1417,"date":"2021-10-21T18:41:42","date_gmt":"2021-10-21T18:41:42","guid":{"rendered":"https:\/\/smartsystems.ece.ufl.edu\/?page_id=1417"},"modified":"2021-10-21T18:41:42","modified_gmt":"2021-10-21T18:41:42","slug":"max-panoff","status":"publish","type":"page","link":"https:\/\/faculty.eng.ufl.edu\/smartsystems\/people\/max-panoff\/","title":{"rendered":"Max Panoff"},"content":{"rendered":"<h2>Biography<\/h2>\n<p>I am a fourth-year Ph.D. student in the Department of Electrical and Computer Engineering. I earned my B.E. with a Concentration in Robotics and a Minor in Social Sciences from Stevens Institute of Technology in Hoboken, NJ.\u00a0 During my time here at the University of Florida, I was awarded the Graduate School Preeminence Award at the University of Florida and have assisted in running two classes: IoT Security and Microprocessor Applications 2.<img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-1423\" src=\"http:\/\/faculty.eng.ufl.edu\/smartsystems\/wp-content\/uploads\/sites\/659\/2021\/10\/peuwnq8gs0sscwgg-201x300.jpg\" alt=\"\" width=\"300\" height=\"447\" \/><\/p>\n<h2>RESEARCH Interests<\/h2>\n<p>Robotics, Machine Learning, Deep Learning, Cyber-Physical Systems, Hardware Security<\/p>\n<h2>COURSEWORK<\/h2>\n<ul>\n<li>Noise in Linear Systems<\/li>\n<li>Advanced Hardware Security<\/li>\n<li>Hands-on Hardware Security<\/li>\n<li>Computer Communications<\/li>\n<li>Mobile Robots<\/li>\n<li>Reconfigurable Computing<\/li>\n<\/ul>\n<h2>Publications<\/h2>\n<table id=\"gsc_a_t\" style=\"height: 1739px\" width=\"657\">\n<thead>\n<tr id=\"gsc_a_trh\">\n<th class=\"gsc_a_t\" scope=\"col\">\n<h5><strong><span id=\"gsc_a_ta\"><span style=\"color: #ffffff\">Title<\/span><\/span><\/strong><\/h5>\n<\/th>\n<th class=\"gsc_a_c\" dir=\"rtl\" scope=\"col\">\n<h5 class=\"gs_nph\"><strong><span style=\"color: #ffffff\">Citations<\/span><\/strong><\/h5>\n<\/th>\n<th class=\"gsc_a_y\" scope=\"col\">\n<h5><span style=\"color: #ffffff\"><strong><span id=\"gsc_a_ha\" class=\"gsc_a_h\">Year<\/span><\/strong><\/span><\/h5>\n<\/th>\n<\/tr>\n<\/thead>\n<tbody id=\"gsc_a_b\">\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"\/smartsystems\/LkGwnXOMwfcC\">Programmable EM Sensor Array for Golden-Model Free Run-time Trojan Detection and Localization<\/a><\/p>\n<div class=\"gs_gray\">H Wang, <strong>M Panoff<\/strong>, Z Zhan, S Wang, C Bobda, D Forte<\/div>\n<div class=\"gs_gray\">arXiv preprint arXiv:2401.12193<span class=\"gs_oph\">, 2024<\/span><\/div>\n<\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2024<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"\/smartsystems\/roLk4NBRz8UC\">A Tenant Side Compilation Solution for Cloud FPGA Deployment<\/a><\/p>\n<div class=\"gs_gray\"><strong>M Panoff<\/strong>, MK Ahmed, H Wang, S Wang, C Bobda<\/div>\n<div class=\"gs_gray\">2023 International Conference on Field Programmable Technology (ICFPT), 16-25<span class=\"gs_oph\">, 2023<\/span><\/div>\n<\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2023<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"\/smartsystems\/_FxGoFyzp5QC\">Semi-Supervised Image Stitching from Unstructured Camera Arrays<\/a><\/p>\n<div class=\"gs_gray\">E Nghonda Tchinda, <strong>M Panoff<\/strong>, D Tchuinkou Kwadjo, C Bobda<\/div>\n<div class=\"gs_gray\">Sensors 23 (23), 9481<span class=\"gs_oph\">, 2023<\/span><\/div>\n<\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2023<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=Xmvcg2gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=Xmvcg2gAAAAJ:ufrVoPGSRksC\">HT-EMIS: A Deep Learning Tool for Hardware Trojan Detection and Identification through Runtime EM Side-Channels<\/a><\/p>\n<div class=\"gs_gray\">H Wang, <strong>M Panoff<\/strong>, S Wang, D Forte<\/div>\n<div class=\"gs_gray\">Proceedings of the Great Lakes Symposium on VLSI 2023, 51-56<\/div>\n<\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=16963752359716767149\">1<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2023<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=Xmvcg2gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=Xmvcg2gAAAAJ:WF5omc3nYNoC\">Dual-Leak: Deep Unsupervised Active Learning for Cross-Device Profiled Side-Channel Leakage Analysis<\/a><\/p>\n<div class=\"gs_gray\">H Yu, S Wang, H Shan, <strong>M Panoff<\/strong>, M Lee, K Yang, Y Jin<\/div>\n<div class=\"gs_gray\">2023 IEEE International Symposium on Hardware Oriented Security and Trust\u00a0\u2026<\/div>\n<\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=8588489260863240431\">2<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2023<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=Xmvcg2gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=Xmvcg2gAAAAJ:W7OEmFMy1HYC\">EMSim: A Fast Layout Level Electromagnetic Emanation Simulation Framework for High Accuracy Pre-Silicon Verification<\/a><\/p>\n<div class=\"gs_gray\">H Ma, <strong>M Panoff<\/strong>, J He, Y Zhao, Y Jin<\/div>\n<div class=\"gs_gray\">IEEE Transactions on Information Forensics and Security 18, 1365-1379<\/div>\n<\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=18114095608178491803\">4<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2023<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=Xmvcg2gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=Xmvcg2gAAAAJ:Y0pCki6q_DkC\">Detection Confidence Driven Multi-Object Tracking to Recover Reliable Tracks From Unreliable Detections<\/a><\/p>\n<div class=\"gs_gray\">T Mandel, M Jimenez, E Risley, T Nammoto, R Williams, <strong>M Panoff<\/strong>, &#8230;<\/div>\n<div class=\"gs_gray\">Pattern Recognition, 109107<\/div>\n<\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=12847380202260441549\">11<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2022<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=Xmvcg2gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=Xmvcg2gAAAAJ:Tyk-4Ss8FVUC\">Generation of Black-box Audio Adversarial Examples Based on Gradient Approximation and Autoencoders<\/a><\/p>\n<div class=\"gs_gray\">PH Huang, H Yu, <strong>M Panoff<\/strong>, TC Wang<\/div>\n<div class=\"gs_gray\">ACM Journal on Emerging Technologies in Computing Systems (JETC) 18 (3), 1-19<\/div>\n<\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=13379086403774459892\">2<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2022<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=Xmvcg2gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=Xmvcg2gAAAAJ:zYLM7Y9cAGgC\">A Review and Comparison of AI-enhanced Side Channel Analysis<\/a><\/p>\n<div class=\"gs_gray\"><strong>M Panoff<\/strong>, H Yu, H Shan, Y Jin<\/div>\n<div class=\"gs_gray\">ACM Journal on Emerging Technologies in Computing Systems (JETC) 18 (3), 1-20<\/div>\n<\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=4457190223291371838\">17<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2022<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=Xmvcg2gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=Xmvcg2gAAAAJ:IjCSPb-OGe4C\">Reliable Multi-Object Tracking in the Presence of Unreliable Detections<\/a><\/p>\n<div class=\"gs_gray\">T Mandel, M Jimenez, E Risley, T Nammoto, R Williams, <strong>M Panoff<\/strong>, &#8230;<\/div>\n<div class=\"gs_gray\">arXiv preprint arXiv:2112.08345<\/div>\n<\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=1641823739058072533\">1<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2021<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=Xmvcg2gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=Xmvcg2gAAAAJ:d1gkVwhDpl0C\">Cross-Device Profiled Side-Channel Attacks using Meta-Transfer Learning<\/a><\/p>\n<div class=\"gs_gray\">H Yu, H Shan, <strong>M Panoff<\/strong>, Y Jin<\/div>\n<div class=\"gs_gray\">2021 58th ACM\/IEEE Design Automation Conference (DAC), 703-708<\/div>\n<\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=5691370050530549120\">26<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2021<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=Xmvcg2gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=Xmvcg2gAAAAJ:UeHWp8X0CEIC\">Security Oriented Design Framework for EM Side-Channel Protection in RTL Implementations<\/a><\/p>\n<div class=\"gs_gray\">J He, H Ma, <strong>M Panoff<\/strong>, H Wang, Y Zhao, L Liu, X Guo, Y Jin<\/div>\n<div class=\"gs_gray\">IEEE Transactions on Computer-Aided Design of Integrated Circuits and\u00a0\u2026<\/div>\n<\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=5492780967484783100\">6<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2021<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=Xmvcg2gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=Xmvcg2gAAAAJ:qjMakFHDy7sC\">Comparing interpretation of high-resolution aerial imagery by humans and artificial intelligence to detect an invasive tree species<\/a><\/p>\n<div class=\"gs_gray\">R Rodriguez III, RL Perroy, J Leary, D Jenkins, <strong>M Panoff<\/strong>, T Mandel, &#8230;<\/div>\n<div class=\"gs_gray\">Remote Sensing 13 (17), 3503<\/div>\n<\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=3634145224041413944\">5<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2021<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=Xmvcg2gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=Xmvcg2gAAAAJ:9yKSN-GCB0IC\">Robust Roadside Physical Adversarial Attack Against Deep Learning in Lidar Perception Modules<\/a><\/p>\n<div class=\"gs_gray\">K Yang, T Tsai, H Yu, <strong>M Panoff<\/strong>, TY Ho, Y Jin<\/div>\n<div class=\"gs_gray\">Proceedings of the 2021 ACM Asia Conference on Computer and Communications\u00a0\u2026<\/div>\n<\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=15636786196954135277\">16<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2021<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=Xmvcg2gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=Xmvcg2gAAAAJ:2osOgNQ5qMEC\">Automatic on-chip clock network optimization for electromagnetic side-channel protection<\/a><\/p>\n<div class=\"gs_gray\">H Ma, J He, <strong>M Panoff<\/strong>, Y Jin, Y Zhao<\/div>\n<div class=\"gs_gray\">IEEE Journal on Emerging and Selected Topics in Circuits and Systems 11 (2\u00a0\u2026<\/div>\n<\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=18056392549879563624\">7<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2021<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=Xmvcg2gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=Xmvcg2gAAAAJ:u-x6o8ySG0sC\">On Sensor Security in the Era of IoT and CPS<\/a><\/p>\n<div class=\"gs_gray\"><strong>M Panoff<\/strong>, RG Dutta, Y Hu, K Yang, Y Jin<\/div>\n<div class=\"gs_gray\">SN Computer Science 2 (1), 1-14<\/div>\n<\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=11418676392377087389\">17<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2021<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Visit: <a href=\"https:\/\/dblp.org\/pid\/284\/6797\">dblp<\/a>, <a href=\"https:\/\/scholar.google.com\/citations?user=Xmvcg2gAAAAJ\">Google Scholar<\/a>, <a href=\"https:\/\/orcid.org\/0000-0003-2849-7197\">ORCiD,<\/a> <a href=\"https:\/\/www.linkedin.com\/in\/maxp808\/\">LinkedIn<\/a><\/p>\n<h2>CONTACT<\/h2>\n<p dir=\"auto\">327 Larsen Hall, Gainesville, FL, 32611<br \/>\nEmail: <a href=\"mailto:m.panoff@ufl.edu\">m.panoff@ufl.edu<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Biography I am a fourth-year Ph.D. student in the Department of Electrical and Computer Engineering. I earned my B.E. with a Concentration in Robotics and a Minor in Social Sciences from Stevens Institute of Technology in Hoboken, NJ.\u00a0 During my time here at the University of Florida, I was awarded the Graduate School Preeminence Award [&hellip;]<\/p>\n","protected":false},"author":1329,"featured_media":1423,"parent":13,"menu_order":21,"comment_status":"closed","ping_status":"closed","template":"page-templates\/page-section-nav.php","meta":{"_acf_changed":false,"inline_featured_image":false,"featured_post":"","footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-1417","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/faculty.eng.ufl.edu\/smartsystems\/wp-json\/wp\/v2\/pages\/1417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/faculty.eng.ufl.edu\/smartsystems\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/faculty.eng.ufl.edu\/smartsystems\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/faculty.eng.ufl.edu\/smartsystems\/wp-json\/wp\/v2\/users\/1329"}],"replies":[{"embeddable":true,"href":"https:\/\/faculty.eng.ufl.edu\/smartsystems\/wp-json\/wp\/v2\/comments?post=1417"}],"version-history":[{"count":0,"href":"https:\/\/faculty.eng.ufl.edu\/smartsystems\/wp-json\/wp\/v2\/pages\/1417\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/faculty.eng.ufl.edu\/smartsystems\/wp-json\/wp\/v2\/pages\/13"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/faculty.eng.ufl.edu\/smartsystems\/wp-json\/wp\/v2\/media\/1423"}],"wp:attachment":[{"href":"https:\/\/faculty.eng.ufl.edu\/smartsystems\/wp-json\/wp\/v2\/media?parent=1417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}