Publisher
Springer Nature Switzerland
Reference26 articles.
1. Abadi, M., et al.: Tensorflow: a system for large-scale machine learning. In: Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation, pp. 265–283. OSDI 2016, USENIX Association, USA (2016)
2. Aseeri, A.O., Zhuang, Y., Alkatheiri, M.S.: A machine learning-based security vulnerability study on XOR PUFS for resource-constraint Internet of Things. In: 2018 IEEE International Congress on Internet of Things (ICIOT), pp. 49–56 (2018). https://doi.org/10.1109/ICIOT.2018.00014
3. Avvaru, S.V.S., Zeng, Z., Parhi, K.K.: Homogeneous and heterogeneous feed-forward xor physical unclonable functions. IEEE Trans. Inf. Forens. Secur. 15, 2485–2498 (2020). https://doi.org/10.1109/TIFS.2020.2968113
4. Avvaru, S.S., Parhi, K.K.: Effect of loop positions on reliability and attack resistance of feed-forward pufs. In: 2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pp. 366–371 (2019). https://doi.org/10.1109/ISVLSI.2019.00073
5. Chollet, F., et al.: Keras (2015). https://keras.io