Login / Signup
Tamper resistance evaluation of PUF implementation against machine learning attack.
Yusuke Nozaki
Masaya Yoshikawa
Published in:
ICBEA (2017)
Keyphrases
</>
machine learning
neural network
feature selection
data analysis
evaluation method
reinforcement learning
information extraction
text mining
computational intelligence
knowledge acquisition
efficient implementation
decision trees
pattern recognition
machine learning methods
secret key