Adversarial examples: Opportunities and challenges

J Zhang, C Li - IEEE transactions on neural networks and …, 2019 - ieeexplore.ieee.org
Deep neural networks (DNNs) have shown huge superiority over humans in image
recognition, speech processing, autonomous vehicles, and medical diagnosis. However …

Physical unclonable functions (PUF) for IoT devices

A Al-Meer, S Al-Kuwari - ACM Computing Surveys, 2023 - dl.acm.org
Physical Unclonable Function (PUF) has recently attracted interest from both industry and
academia as a potential alternative approach to secure Internet of Things (IoT) devices from …

A puf taxonomy

T McGrath, IE Bagci, ZM Wang, U Roedig… - Applied physics …, 2019 - pubs.aip.org
Authentication is an essential cryptographic primitive that confirms the identity of parties
during communications. For security, it is important that these identities are complex, in order …

Physical unclonable function-based key sharing via machine learning for IoT security

J Zhang, G Qu - IEEE transactions on Industrial Electronics, 2019 - ieeexplore.ieee.org
In many industry Internet of Things applications, resources like CPU, memory, and battery
power are limited and cannot afford the classic cryptographic security solutions. Silicon …

Voxelated opto-physically unclonable functions via irreplicable wrinkles

K Kim, SU Kim, MY Choi, MH Saeed, Y Kim… - Light: Science & …, 2023 - nature.com
The increased prevalence of the Internet of Things (IoT) and the integration of digital
technology into our daily lives have given rise to heightened security risks and the need for …

Voltage over-scaling-based lightweight authentication for IoT security

J Zhang, C Shen, H Su, MT Arafin… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
It is a challenging task to deploy lightweight security protocols in resource-constrained IoT
applications. A hardware-oriented lightweight authentication protocol based on device …

Approximation attacks on strong PUFs

J Shi, Y Lu, J Zhang - … transactions on computer-aided design of …, 2019 - ieeexplore.ieee.org
Physical unclonable function (PUF) is a promising lightweight hardware security primitive for
resource-constrained systems. It can generate a large number of challenge-response pairs …

A survey of hardware Trojan threat and defense

H Li, Q Liu, J Zhang - Integration, 2016 - Elsevier
Abstract Hardware Trojans (HTs) can be implanted in security-weak parts of a chip with
various means to steal the internal sensitive data or modify original functionality, which may …

Spintronic physical unclonable functions based on field‐free spin–orbit‐torque switching

S Lee, J Kang, JM Kim, N Kim, D Han, T Lee… - Advanced …, 2022 - Wiley Online Library
Physical unclonable function (PUFs) utilize inherent random physical variations of solid‐
state devices and are a core ingredient of hardware security primitives. PUFs promise more …

Emerging physical unclonable functions with nanotechnology

Y Gao, DC Ranasinghe, SF Al-Sarawi, O Kavehei… - IEEE …, 2016 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) are increasingly used for authentication and
identification applications as well as the cryptographic key generation. An important feature …