1. Ahmed B., Bepary M.K., Pundir N., Borza M., Raikhman O., Garg A., Donchin D., Cron A., Mama Abdel-moneum, Farahmandi. F. Quantifiable confirmation: from IPs to stages. Preprint. arXiv:220407909, (2022)
2. Alam M.M., Tehranipoor M., Strength. D. Reused FPGA recognition utilizing thorough LUT way postpone portrayal. In IEEE Worldwide. Te. meet., (ITC). IEEE, Piscataway, 1-10, (2016)
3. Alam M., Chowdhury S., Tehranipoor M.M., Guin. U. Hearty, minimal expense, and precise recognition of reused ICs utilizing advanced marks. In IEEE worldwide conference on equipment arranged security and trust (HOST). IEEE, Piscataway, 209-214, (2018)
4. Becher A., Benenson Z., Dornseif. M. Messing with bits: certifiable actual assaults on remote sensor organizations. In: Global gathering on security in unavoidable registering. Springer, Berlin, 104-118, (2006)
5. Bhunia S., Tehranipoor. M. Equipment security: an involved learning approach. Morgan Kaufmann, Burlington, (2018)