Login / Signup
Adversarial Attack against Modeling Attack on PUFs.
Sying-Jyan Wang
Yu-Shen Chen
Katherine Shu-Min Li
Published in:
DAC (2019)
Keyphrases
</>
countermeasures
malicious users
artificial intelligence
information systems
similarity measure
evolutionary algorithm
anomaly detection
modeling method
malicious attacks
digital watermark
data corruption
key exchange protocol