Machine Learning Attacks on PolyPUF, OB-PUF, RPUF, and PUF-FSM.
Jeroen DelvauxPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- electronic devices
- machine learning
- network anomaly detection
- machine learning methods
- countermeasures
- pattern recognition
- information extraction
- data mining
- data analysis
- learning algorithm
- support vector machine
- natural language processing
- artificial intelligence
- computer science
- model selection
- machine learning algorithms
- attack detection
- learning problems
- explanation based learning
- neural network
- malicious users
- malicious attacks
- machine learning approaches
- smart phones
- inductive learning
- statistical methods
- feature selection
- model checking
- knowledge representation