Fully Symmetrical Obfuscated Interconnection and Weak-PUF-Assisted Challenge Obfuscation Strong PUFs Against Machine-Learning Modeling Attacks.
Chongyao XuLitao ZhangPui-In MakRui Paulo MartinsMan-Kay LawPublished in: IEEE Trans. Inf. Forensics Secur. (2024)
Keyphrases
- machine learning
- reverse engineering
- machine learning algorithms
- pattern recognition
- text classification
- natural language
- knowledge acquisition
- statistical methods
- active learning
- machine learning approaches
- countermeasures
- decision trees
- feature selection
- data driven approaches
- supervised learning
- explanation based learning
- network anomaly detection
- learning systems
- natural language processing
- information extraction
- computer science
- high level
- web services
- artificial intelligence
- learning algorithm