All Blog Posts#
Artificial Intelligence#
PTM Naming: Why “What’s in a Name” Actually Matters for AI Reuse
I’m thrilled to share some recent work led by Wenxin Jiang, a PhD student at Purdue University. Wenxin is supervised by James C. Davis, and I have had the pleasure of serving as a key external supervisor and PhD committee member on this project as part of my ongoing collaboration with Dr. Davis. This research was recently accepted for publication in Journal of Empirical Software Engineering and it tackles a problem that anyone working in AI has likely grumbled about: how we name our models.
Software Engineering#
-
Zero Involvement Pairing and Authentication (ZIPA) is a technique for automatically provisioning large networks of Internet-of-Things (IoT) devices with no user involvement. Prior ZIPA work generally assumes that the environment used for pairing is sufficiently isolated from external, adversarial signals. In our DESTION 2024 paper [], we present the first signal-injection attack capable of influencing ZIPA-based key generation, demonstrating that these assumptions can fail in realistic settings.