{"id":102,"date":"2023-11-06T00:02:17","date_gmt":"2023-11-06T05:02:17","guid":{"rendered":"https:\/\/www.ece.ucf.edu\/~kamali\/?page_id=102"},"modified":"2025-09-28T08:41:54","modified_gmt":"2025-09-28T12:41:54","slug":"services","status":"publish","type":"page","link":"https:\/\/www.ece.ucf.edu\/~kamali\/services\/","title":{"rendered":"Services &#038; Activities"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Invited Talks<\/h2>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(236,236,236) 0%,rgb(255,255,255) 19%,rgb(230,230,230) 37%,rgb(225,225,225) 57%,rgb(255,255,255) 85%,rgb(240,240,240) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2025<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<p style=\"font-size:16px\"><strong>Invited Talk<\/strong><br><strong>Title:<\/strong> Can a Language Model Be Your Hardware Security \u000bCo-Designer and Verifier?<br><strong>@<\/strong> Micro-Electronics Security Training (MEST) Center Webinar, Virtual (Zoom), September 2025.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(236,236,236) 0%,rgb(255,255,255) 19%,rgb(230,230,230) 37%,rgb(225,225,225) 57%,rgb(255,255,255) 85%,rgb(240,240,240) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2024<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<p style=\"font-size:16px\"><strong>Invited Talk<\/strong><br><strong>Title:<\/strong> Evolutionary Large Language Models for Hardware Security: The Challenging Obstacles<br><strong>@<\/strong> Temple University, College of Engineering Seminar Series, Virtual (Zoom), Oct 2024<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p style=\"font-size:16px\"><strong>Invited Talk | Special Session<\/strong><br><strong>Title:<\/strong> From Full-Custom to Gate-Array ASIC for Hardware IP Protection<br><strong>@<\/strong> IEEE Dallas Circuits and Systems Conference (IEEE DCAS), Virtual (Zoom), April 2024<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(236,236,236) 0%,rgb(255,255,255) 19%,rgb(230,230,230) 37%,rgb(225,225,225) 57%,rgb(255,255,255) 85%,rgb(240,240,240) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2023<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<p style=\"font-size:16px\"><strong>Invited Talk | Special Session<\/strong><br><strong>Title:<\/strong> Metrics-to-methods: Decisive reverse engineering metrics for resilient logic locking<br><strong>@<\/strong> ACM Great Lakes Symposium on VLSI (GLSVLSI), Knoxville, TN, June 2023.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(236,236,236) 0%,rgb(255,255,255) 19%,rgb(230,230,230) 37%,rgb(225,225,225) 57%,rgb(255,255,255) 85%,rgb(240,240,240) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2022<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<p style=\"font-size:16px\"><strong>Invited Talk <\/strong><br><strong>Title:<\/strong> Security of Hardware Generators: Secure from Construction<br><strong>@<\/strong> CAD4Sec Workshop 2022 co-located with Design Automation Conference, San Francisco, CA, July 2022.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p style=\"font-size:16px\"><strong>Invited Talk <\/strong><br><strong>Title:<\/strong> IP Protection through Logic Locking: What to Expect From the State-of-the-art Techniques<br><strong>@<\/strong> Micro-Electronics Security Training (MEST) Center Webinar, Virtual (Zoom), March 2022.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(236,236,236) 0%,rgb(255,255,255) 19%,rgb(230,230,230) 37%,rgb(225,225,225) 57%,rgb(255,255,255) 85%,rgb(240,240,240) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2021<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<p style=\"font-size:16px\"><strong>Invited Talk <\/strong><br><strong>Title:<\/strong> The Usage and Applicability of Satisfiability Modulo Theory (SMT) on Logic Locking<br><strong>@<\/strong> IEEE CEDA &#8211; CADforAssurance, Virtual (Zoom), March 2021.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(236,236,236) 0%,rgb(255,255,255) 19%,rgb(230,230,230) 37%,rgb(225,225,225) 57%,rgb(255,255,255) 85%,rgb(240,240,240) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2019<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<p style=\"font-size:16px\"><strong>Invited Talk | Special Session<\/strong><br><strong>Title:<\/strong> Threats on Logic Locking: A Decade Later<br><strong>@<\/strong> ACM Great Lakes Symposium on VLSI (GLSVLSI), Tysons Corner, VA, May 2019.<\/p>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Tutorials and Training Sessions<\/h2>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(236,236,236) 0%,rgb(255,255,255) 19%,rgb(230,230,230) 37%,rgb(225,225,225) 57%,rgb(255,255,255) 85%,rgb(240,240,240) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2021<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<p style=\"font-size:16px\"><strong>Tutorial<\/strong><br><strong>Title:<\/strong> SMT attack: How Satisfiability Module Theories Enhance De-Obfuscation Capability?<br><strong>@<\/strong> IEEE CEDA &#8211; CADforAssurance, Virtual (Zoom), May 2021.<\/p>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Campus and Departmental Talks<\/h2>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(196,160,128) 0%,rgb(235,227,223) 29%,rgb(247,238,228) 62%,rgb(187,158,133) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2024<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<p style=\"font-size:16px\"><strong>CECS College Seminar<\/strong><br><strong>Title:<\/strong> Automation in Hardware Security: From Design to Verification and Testing<br><strong>@<\/strong> University of Central Florida, College of Engineering and Computer Science (CECS) Virtual Series (Zoom), February 2024.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(196,160,128) 0%,rgb(235,227,223) 29%,rgb(247,238,228) 62%,rgb(187,158,133) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2023<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<p style=\"font-size:16px\"><strong>Invited Talk<\/strong><br><strong>Title:<\/strong> Microelectronics Supply Chain Security: Building Secure Hardware by Construction<br><strong>@<\/strong> University of Central Florida, ECE Department, Orlando, FL, April 2023.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(196,160,128) 0%,rgb(235,227,223) 29%,rgb(247,238,228) 62%,rgb(187,158,133) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2022<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<p style=\"font-size:16px\"><strong>Invited Talk<\/strong><br><strong>Title:<\/strong> Hardware Security from High-Level Abstraction Level<br><strong>@<\/strong> University of Florida, ECE Seminar Series, Gainesville, FL, November 2022.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(196,160,128) 0%,rgb(235,227,223) 29%,rgb(247,238,228) 62%,rgb(187,158,133) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2021<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<p style=\"font-size:16px\"><strong>ECE Seminar<\/strong><br><strong>Title:<\/strong> Evolution of Logic Locking: Moving Towards Next Generation Logic Locking Countermeasures<br><strong>@<\/strong> George Mason University, ECE Seminar Series, Fairfax, VA, April 2021.<\/p>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Panel and Roundtable Discussions<\/h2>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(196,217,214) 0%,rgb(229,247,246) 34%,rgb(226,241,239) 64%,rgb(167,209,202) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2022<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<p style=\"font-size:16px\"><strong>Panel Presenter<\/strong><br><strong>Title:<\/strong> Hardware Security from High-Level Abstraction Level<br><strong>@<\/strong> NIST-AFRL Meeting, Virtual (Zoom).<\/p>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Organizing and Technical Committee<\/h2>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(139,156,176) 0%,rgb(222,226,231) 34%,rgb(220,226,233) 75%,rgb(119,132,145) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2026<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<ul style=\"font-size:17px\" class=\"wp-block-list\">\n<li style=\"font-size:16px\"><strong>TPC Member<\/strong>, IEEE Int\u2019l Symp. on Hardware Oriented Security and Trust (HOST)<\/li>\n\n\n\n<li style=\"font-size:16px\"><strong>Hardware Demo Chair,<\/strong> IEEE Int\u2019l Symp. on Hardware Oriented Security and Trust (HOST)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(139,156,176) 0%,rgb(222,226,231) 34%,rgb(220,226,233) 75%,rgb(119,132,145) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2025<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<ul style=\"font-size:17px\" class=\"wp-block-list\">\n<li style=\"font-size:16px\"><strong>TPC Member<\/strong>, Design Automation and Test in Europe (DATE) Conference<\/li>\n\n\n\n<li><strong>TPC Member<\/strong>, IEEE International Conference on Computer Design (ICCD)<\/li>\n\n\n\n<li style=\"font-size:16px\"><strong>TPC Member<\/strong>, IEEE Int\u2019l Symp. on Hardware Oriented Security and Trust (HOST)<\/li>\n\n\n\n<li><strong>TPC Member<\/strong>, Int&#8217;l Workshop on Secure HW, Architectures, and SW (SeHAS)<\/li>\n\n\n\n<li style=\"font-size:16px\"><strong>Hardware Demo Chair,<\/strong> IEEE Int\u2019l Symp. on Hardware Oriented Security and Trust (HOST)<\/li>\n\n\n\n<li style=\"font-size:16px\"><strong>Session Chair<\/strong>, IEEE VLSI Test Symposium (VTS)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(139,156,176) 0%,rgb(222,226,231) 34%,rgb(220,226,233) 75%,rgb(119,132,145) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2024<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<ul style=\"font-size:17px\" class=\"wp-block-list\">\n<li style=\"font-size:16px\"><strong>TPC Member<\/strong>, Design Automation and Test in Europe (DATE) Conference<\/li>\n\n\n\n<li style=\"font-size:16px\"><strong>TPC Member<\/strong>, IEEE Int\u2019l Symp. on Hardware Oriented Security and Trust (HOST)<\/li>\n\n\n\n<li style=\"font-size:16px\"><strong>TPC Member<\/strong>, IEEE International Conference on Computer Design (ICCD)<\/li>\n\n\n\n<li style=\"font-size:16px\"><strong>TPC Member<\/strong>, ACM Great Lakes Symposium on VLSI (GLSVLSI)<\/li>\n\n\n\n<li style=\"font-size:16px\"><strong>TPC Member<\/strong>, IEEE Computer Society Annual Symposium on VLSI (ISVLSI)<\/li>\n\n\n\n<li style=\"font-size:16px\"><strong>Session Chair<\/strong>, IEEE Int&#8217;l Conference on Physical Assurance and Inspection of Electronics (PAINE)<\/li>\n\n\n\n<li style=\"font-size:16px\"><strong>Session Chair<\/strong>, ACM Great Lakes Symposium on VLSI (GLSVLSI)<\/li>\n\n\n\n<li style=\"font-size:16px\"><strong>Session Chair<\/strong>, IEEE Computer Society Annual Symposium on VLSI (ISVLSI)<\/li>\n\n\n\n<li style=\"font-size:16px\"><strong>Hardware Competition Chair,<\/strong> IEEE Int\u2019l Symp. on Hardware Oriented Security and Trust (HOST)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(139,156,176) 0%,rgb(222,226,231) 34%,rgb(220,226,233) 75%,rgb(119,132,145) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2023<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<ul style=\"font-size:17px\" class=\"wp-block-list\">\n<li style=\"font-size:16px\"><strong>TPC Member<\/strong>, ACM Great Lakes Symposium on VLSI (GLSVLSI)<\/li>\n\n\n\n<li style=\"font-size:16px\"><strong>Publicity Chair<\/strong>, CAD4Sec Workshop, Co-located with Design Automation Conference (DAC)<\/li>\n\n\n\n<li style=\"font-size:16px\"><strong>TPC Member<\/strong>, IEEE Int\u2019l Symp. on Hardware Oriented Security and Trust (HOST)<\/li>\n\n\n\n<li style=\"font-size:16px\"><strong>Publicity Chair<\/strong>, IEEE Int\u2019l Symp. on Hardware Oriented Security and Trust (HOST)<\/li>\n\n\n\n<li style=\"font-size:16px\"><strong>TPC Member<\/strong>, IEEE Midwest Symposium on Circuits and Systems (MWSCAS), 2023<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(139,156,176) 0%,rgb(222,226,231) 34%,rgb(220,226,233) 75%,rgb(119,132,145) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2022<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<ul style=\"font-size:17px\" class=\"wp-block-list\">\n<li style=\"font-size:16px\"><strong>Session Chair<\/strong>, IEEE Int\u2019l Symp. on Hardware Oriented Security and Trust (HOST)<\/li>\n\n\n\n<li style=\"font-size:16px\"><strong>Publicity Chair<\/strong>, CAD4Sec Workshop, Co-located with Design Automation Conference (DAC)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(139,156,176) 0%,rgb(222,226,231) 34%,rgb(220,226,233) 75%,rgb(119,132,145) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2018<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<ul style=\"font-size:17px\" class=\"wp-block-list\">\n<li style=\"font-size:16px\"><strong>Student Organizing Team<\/strong>, Center for Hardware and Embedded System Security and Trust (CHEST)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(139,156,176) 0%,rgb(222,226,231) 34%,rgb(220,226,233) 75%,rgb(119,132,145) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2015<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<ul style=\"font-size:17px\" class=\"wp-block-list\">\n<li style=\"font-size:16px\"><strong>AV Chair<\/strong>, Computer Architecture &amp; Digital Systems Conference (CADS)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Journal Papers Review<\/h2>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(236,236,236) 0%,rgb(255,255,255) 19%,rgb(230,230,230) 37%,rgb(225,225,225) 57%,rgb(255,255,255) 85%,rgb(240,240,240) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2025<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<ul style=\"font-size:16px\" class=\"wp-block-list\">\n<li style=\"font-size:16px\">IEEE Transactions on Reliability (IEEE TR)<\/li>\n\n\n\n<li>IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (IEEE TCAD)<\/li>\n\n\n\n<li>IEEE Transactions on Information Forensics and Security (IEEE TIFS)<\/li>\n\n\n\n<li>ACM Transactions on Design Automation of Electronic Systems (ACM TODAES)<\/li>\n\n\n\n<li style=\"font-size:16px\">Springer Journal of Electronic Testing<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(236,236,236) 0%,rgb(255,255,255) 19%,rgb(230,230,230) 37%,rgb(225,225,225) 57%,rgb(255,255,255) 85%,rgb(240,240,240) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2024<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<ul style=\"font-size:16px\" class=\"wp-block-list\">\n<li style=\"font-size:16px\">IEEE Transactions on Very Large Scale Integration (IEEE TVLSI)<\/li>\n\n\n\n<li style=\"font-size:16px\">Springer Journal of Electronic Testing<\/li>\n\n\n\n<li style=\"font-size:16px\">MDPI Electronics<\/li>\n\n\n\n<li style=\"font-size:16px\">MDPI Cryptography<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(236,236,236) 0%,rgb(255,255,255) 19%,rgb(230,230,230) 37%,rgb(225,225,225) 57%,rgb(255,255,255) 85%,rgb(240,240,240) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2023<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<ul style=\"font-size:16px\" class=\"wp-block-list\">\n<li style=\"font-size:16px\">Elsevier Microprocessors and Microsystems (Elsevier MICPRO)<\/li>\n\n\n\n<li style=\"font-size:16px\">Springer Journal of Electronic Testing<\/li>\n\n\n\n<li style=\"font-size:16px\">IEEE Transactions on Information Forensics and Security (IEEE TIFS)<\/li>\n\n\n\n<li style=\"font-size:16px\">IEEE Transactions on Very Large Scale Integration (IEEE TVLSI)<\/li>\n\n\n\n<li style=\"font-size:16px\">ACM Journal on Emerging Technologies in Computing Systems (ACM JETC)<\/li>\n\n\n\n<li style=\"font-size:16px\">IEEE Embedded System Letter (IEEE ESL)<\/li>\n\n\n\n<li style=\"font-size:16px\">MDPI Sensors<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(236,236,236) 0%,rgb(255,255,255) 19%,rgb(230,230,230) 37%,rgb(225,225,225) 57%,rgb(255,255,255) 85%,rgb(240,240,240) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2022<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<ul style=\"font-size:16px\" class=\"wp-block-list\">\n<li style=\"font-size:16px\">Springer Journal of Electronic Testing<\/li>\n\n\n\n<li style=\"font-size:16px\">IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (IEEE TCAD)<\/li>\n\n\n\n<li style=\"font-size:16px\">IEEE Transactions on Very Large Scale Integration (IEEE TVLSI)<\/li>\n\n\n\n<li style=\"font-size:16px\">ACM Journal on Emerging Technologies in Computing Systems (ACM JETC)<\/li>\n\n\n\n<li style=\"font-size:16px\">IEEE Transactions on Emerging Topics in Computing (IEEE TETC)<\/li>\n\n\n\n<li style=\"font-size:16px\">MDPI Cryptography<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(236,236,236) 0%,rgb(255,255,255) 19%,rgb(230,230,230) 37%,rgb(225,225,225) 57%,rgb(255,255,255) 85%,rgb(240,240,240) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2021<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<ul style=\"font-size:16px\" class=\"wp-block-list\">\n<li style=\"font-size:16px\">IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (IEEE TCAD)<\/li>\n\n\n\n<li style=\"font-size:16px\">IEEE Transactions on Very Large Scale Integration (IEEE TVLSI)<\/li>\n\n\n\n<li style=\"font-size:16px\">ACM Transactions on Design Automation of Electronic Systems (ACM TODAES)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(236,236,236) 0%,rgb(255,255,255) 19%,rgb(230,230,230) 37%,rgb(225,225,225) 57%,rgb(255,255,255) 85%,rgb(240,240,240) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2020<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<ul style=\"font-size:16px\" class=\"wp-block-list\">\n<li style=\"font-size:16px\">IEEE Transactions on Very Large Scale Integration (IEEE TVLSI)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(236,236,236) 0%,rgb(255,255,255) 19%,rgb(230,230,230) 37%,rgb(225,225,225) 57%,rgb(255,255,255) 85%,rgb(240,240,240) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2019<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<ul style=\"font-size:16px\" class=\"wp-block-list\">\n<li style=\"font-size:16px\">IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (IEEE TCAD)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(236,236,236) 0%,rgb(255,255,255) 19%,rgb(230,230,230) 37%,rgb(225,225,225) 57%,rgb(255,255,255) 85%,rgb(240,240,240) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2018<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<ul style=\"font-size:16px\" class=\"wp-block-list\">\n<li style=\"font-size:16px\">IEEE Transactions on Very Large Scale Integration (IEEE TVLSI)<\/li>\n\n\n\n<li style=\"font-size:16px\">IEEE Transactions on Computers (IEEE TC)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Other Conference Papers Reviews<\/h2>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(203,192,192) 0%,rgb(228,206,206) 23%,rgb(255,232,232) 53%,rgb(223,205,205) 76%,rgb(145,145,145) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2024<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<ul style=\"font-size:17px\" class=\"wp-block-list\">\n<li style=\"font-size:16px\">IEEE VLSI Test Symposium (VTS)<\/li>\n\n\n\n<li style=\"font-size:16px\">IEEE Computer Society Annual Symposium on VLSI (ISVLSI)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(203,192,192) 0%,rgb(228,206,206) 23%,rgb(255,232,232) 53%,rgb(223,205,205) 76%,rgb(145,145,145) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2023<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<ul style=\"font-size:17px\" class=\"wp-block-list\">\n<li style=\"font-size:16px\">IEEE International Symposium on Hardware Oriented Security and Trust (HOST)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(203,192,192) 0%,rgb(228,206,206) 23%,rgb(255,232,232) 53%,rgb(223,205,205) 76%,rgb(145,145,145) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2022<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<ul style=\"font-size:17px\" class=\"wp-block-list\">\n<li style=\"font-size:16px\">ACM\/IEEE Design Automation Conference (DAC)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(203,192,192) 0%,rgb(228,206,206) 23%,rgb(255,232,232) 53%,rgb(223,205,205) 76%,rgb(145,145,145) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2021<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<ul style=\"font-size:17px\" class=\"wp-block-list\">\n<li style=\"font-size:16px\">ACM\/IEEE Design Automation Conference (DAC)<\/li>\n\n\n\n<li style=\"font-size:16px\">IEEE Computer Society Annual Symposium on VLSI (ISVLSI)<\/li>\n\n\n\n<li style=\"font-size:16px\">ACM Great Lake Symposioum on VLSI (GLSVLSI)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(203,192,192) 0%,rgb(228,206,206) 23%,rgb(255,232,232) 53%,rgb(223,205,205) 76%,rgb(145,145,145) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2020<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<ul style=\"font-size:17px\" class=\"wp-block-list\">\n<li style=\"font-size:16px\">ACM\/IEEE Design Automation Conference (DAC)<\/li>\n\n\n\n<li style=\"font-size:16px\">ACM Great Lake Symposioum on VLSI (GLSVLSI)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(203,192,192) 0%,rgb(228,206,206) 23%,rgb(255,232,232) 53%,rgb(223,205,205) 76%,rgb(145,145,145) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2019<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<ul style=\"font-size:17px\" class=\"wp-block-list\">\n<li style=\"font-size:16px\">IEEE Computer Society Annual Symposium on VLSI (ISVLSI)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">University\/College\/Department Services<\/h2>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(139,156,176) 0%,rgb(222,226,231) 34%,rgb(220,226,233) 75%,rgb(119,132,145) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2026<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<ul style=\"font-size:17px\" class=\"wp-block-list\">\n<li style=\"font-size:16px\">Florida Cluster Initiatives (FCI) Faculty Fellow, Student and Postdoc Engagement<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-black-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-radius:38px;background:linear-gradient(180deg,rgb(139,156,176) 0%,rgb(222,226,231) 34%,rgb(220,226,233) 75%,rgb(119,132,145) 100%)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"font-size:16px;flex-basis:10%\">\n<p class=\"has-text-align-left\" style=\"font-size:16px\"><strong>2025<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<ul style=\"font-size:17px\" class=\"wp-block-list\">\n<li style=\"font-size:16px\">Florida Cluster Initiatives (FCI) Faculty Fellow, Student and Postdoc Engagement<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"Invited Talks 2025 Invited TalkTitle: Can a Language Model Be Your Hardware Security \u000bCo-Designer and Verifier?@ Micro-Electronics Security Training (MEST) Center Webinar, Virtual (Zoom), September 2025. 2024 Invited TalkTitle: Evolutionary Large Language Models for Hardware Security: The Challenging Obstacles@ Temple University, College of Engineering Seminar Series, Virtual (Zoom), Oct 2024 Invited Talk | Special SessionTitle:&hellip;","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-102","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ece.ucf.edu\/~kamali\/wp-json\/wp\/v2\/pages\/102","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ece.ucf.edu\/~kamali\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ece.ucf.edu\/~kamali\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ece.ucf.edu\/~kamali\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ece.ucf.edu\/~kamali\/wp-json\/wp\/v2\/comments?post=102"}],"version-history":[{"count":30,"href":"https:\/\/www.ece.ucf.edu\/~kamali\/wp-json\/wp\/v2\/pages\/102\/revisions"}],"predecessor-version":[{"id":999,"href":"https:\/\/www.ece.ucf.edu\/~kamali\/wp-json\/wp\/v2\/pages\/102\/revisions\/999"}],"wp:attachment":[{"href":"https:\/\/www.ece.ucf.edu\/~kamali\/wp-json\/wp\/v2\/media?parent=102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}