{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:10:05Z","timestamp":1742911805588,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819615445"},{"type":"electronic","value":"9789819615452"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1545-2_7","type":"book-chapter","created":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T16:55:32Z","timestamp":1739379332000},"page":"100-113","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Neural Network-Based PUF Protection Method Against Machine Learning Attack"],"prefix":"10.1007","author":[{"given":"Haolin","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Chenxi","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Ding","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Shengqiang","family":"Lou","sequence":"additional","affiliation":[]},{"given":"Pengyue","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,13]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.vlsi.2021.06.001","volume":"81","author":"NN Anandakumar","year":"2021","unstructured":"Anandakumar, N.N., Hashmi, M.S., Tehranipoor, M.: FPGA-based physical unclonable functions: a comprehensive overview of theory and architectures. Integration 81, 175\u2013194 (2021). https:\/\/doi.org\/10.1016\/j.vlsi.2021.06.001","journal-title":"Integration"},{"issue":"14","key":"7_CR2","doi-asserted-by":"publisher","first-page":"12715","DOI":"10.1109\/JIOT.2023.3253258","volume":"10","author":"A Kama","year":"2023","unstructured":"Kama, A., Amar, M., Gaaton, S., Wang, K., Tu, Y., Oren, Y.: Juliet-PUF: enhancing the security of IoT-based SRAM-PUFs using the remanence decay effect. IEEE Internet Things J. 10(14), 12715\u201312727 (2023). https:\/\/doi.org\/10.1109\/JIOT.2023.3253258","journal-title":"IEEE Internet Things J."},{"key":"7_CR3","doi-asserted-by":"publisher","unstructured":"Rabiei, H., Kaveh, M., Reza Mosavi, M., Mart, D.: MCRO-PUF: a novel modified crossover RO-PUF with an ultra-expanded CRP space. Comput. Mater. Continua 74(3), 4831\u20134845 (2023). https:\/\/doi.org\/10.32604\/cmc.2023.034981","DOI":"10.32604\/cmc.2023.034981"},{"key":"7_CR4","doi-asserted-by":"publisher","unstructured":"Ni, L., Wang, P., Zhang, Y., Li, G., Ding, L., Zhang, J.: PI PUF: a processor-intrinsic PUF for IoT. Comput. Electr. Eng. 105(C) (2023). https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108540","DOI":"10.1016\/j.compeleceng.2022.108540"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: 2007 44th ACM\/IEEE Design Automation Conference, pp. 9\u201314, June 2007","DOI":"10.1109\/DAC.2007.375043"},{"issue":"16","key":"7_CR6","doi-asserted-by":"publisher","first-page":"14408","DOI":"10.1109\/JIOT.2021.3065836","volume":"9","author":"S Chen","year":"2022","unstructured":"Chen, S., Li, B., Chen, Z., Zhang, Y., Wang, C., Tao, C.: Novel strong-PUF-based authentication protocols leveraging Shamir\u2019s secret sharing. IEEE Internet Things J. 9(16), 14408\u201314425 (2022). https:\/\/doi.org\/10.1109\/JIOT.2021.3065836","journal-title":"IEEE Internet Things J."},{"key":"7_CR7","doi-asserted-by":"publisher","unstructured":"Idriss, T., Gavin, A., Gabales, A., Idriss, H., Bayoumi, M.: XFeed PUF: a secure and efficient delay-based strong PUF using cross-feed connections. In: 2022 IEEE International Symposium on Circuits and Systems (ISCAS), Austin, TX, USA, pp. 461\u2013465. IEEE, May 2022. https:\/\/doi.org\/10.1109\/ISCAS48785.2022.9937815","DOI":"10.1109\/ISCAS48785.2022.9937815"},{"key":"7_CR8","doi-asserted-by":"publisher","unstructured":"Xu, C., Zhang, J., Law, M.-K., Zhao, X., Mak, P.-I., Martins, R.P.: Transfer-path-based hardware-reuse strong PUF achieving modeling attack resilience with200 million training CRPs. IEEE Trans. Inf. Forensic Secur. 18, 2188\u20132203 (2023). https:\/\/doi.org\/10.1109\/TIFS.2023.3263621","DOI":"10.1109\/TIFS.2023.3263621"},{"key":"7_CR9","doi-asserted-by":"publisher","unstructured":"Wu, L., Hu, Y., Zhang, K., Li, W., Xu, X., Chang, W.: FLAM-PUF: a response\u2013feedback-based lightweight anti-machine-learning-attack PUF. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(11), 4433\u20134444 (2022). https:\/\/doi.org\/10.1109\/TCAD.2022.3197696","DOI":"10.1109\/TCAD.2022.3197696"},{"issue":"9","key":"7_CR10","doi-asserted-by":"publisher","first-page":"1256","DOI":"10.1109\/TVLSI.2022.3189953","volume":"30","author":"Y Wang","year":"2022","unstructured":"Wang, Y., Wang, C., Gu, C., Cui, Y., O\u2019Neill, M., Liu, W.: A generic dynamic responding mechanism and secure authentication protocol for strong PUFs. IEEE Trans. VLSI Syst. 30(9), 1256\u20131268 (2022). https:\/\/doi.org\/10.1109\/TVLSI.2022.3189953","journal-title":"IEEE Trans. VLSI Syst."},{"key":"7_CR11","doi-asserted-by":"publisher","unstructured":"Lin, C.-C., Chen, M.-S.: Enhancing reliability and security: a configurable poisoning PUF against modeling attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(11), 4301\u20134312 (2022). https:\/\/doi.org\/10.1109\/TCAD.2022.3197529","DOI":"10.1109\/TCAD.2022.3197529"},{"key":"7_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103693","volume":"217","author":"A Sajadi","year":"2023","unstructured":"Sajadi, A., Shabani, A., Alizadeh, B.: DC-PUF: machine learning-resistant PUF-based authentication protocol using dependency chain for resource-constraint IoT devices. J. Netw. Comput. Appl. 217, 103693 (2023). https:\/\/doi.org\/10.1016\/j.jnca.2023.103693","journal-title":"J. Netw. Comput. Appl."},{"key":"7_CR13","doi-asserted-by":"publisher","unstructured":"Wang, Y., Wang, C., Gu, C., Cui, Y., O\u2019Neill, M., Liu, W.: A dynamically configurable PUF and dynamic matching authentication protocol. IEEE Trans. Emerg. Topics Comput. 1 (2021). https:\/\/doi.org\/10.1109\/TETC.2021.3072421","DOI":"10.1109\/TETC.2021.3072421"},{"issue":"1","key":"7_CR14","doi-asserted-by":"publisher","first-page":"93","DOI":"10.3390\/s24010093","volume":"24","author":"B Zhu","year":"2023","unstructured":"Zhu, B., Jiang, X., Huang, K., Yu, M.: A response-feedback-based strong PUF with improved strict avalanche criterion and reliability. Sensors 24(1), 93 (2023). https:\/\/doi.org\/10.3390\/s24010093","journal-title":"Sensors"},{"key":"7_CR15","doi-asserted-by":"publisher","unstructured":"Becker, G.T.: The gap between promise and reality: on the insecurity of XOR arbiter PUFs. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 535\u2013555. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48324-4_27","DOI":"10.1007\/978-3-662-48324-4_27"},{"key":"7_CR16","unstructured":"Santikellur, P., Bhattacharyay, A., Chakraborty, R.S.: Deep learning based model building attacks on arbiter PUF compositions (2019)"},{"issue":"8","key":"7_CR17","doi-asserted-by":"publisher","first-page":"2043","DOI":"10.1109\/TIFS.2019.2891223","volume":"14","author":"J Delvaux","year":"2019","unstructured":"Delvaux, J.: Machine-learning attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF\u2013FSMs. IEEE Trans. Inf. Forensic Secur. 14(8), 2043\u20132058 (2019). https:\/\/doi.org\/10.1109\/TIFS.2019.2891223","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"issue":"2","key":"7_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnlest.2023.100204","volume":"21","author":"J-Y Zhan","year":"2023","unstructured":"Zhan, J.-Y., et al.: FPGA-based acceleration for binary neural networks in edge computing. J. Electron. Sci. Technol. 21(2), 100204 (2023). https:\/\/doi.org\/10.1016\/j.jnlest.2023.100204","journal-title":"J. Electron. Sci. Technol."},{"key":"7_CR19","doi-asserted-by":"publisher","unstructured":"Majzoobi, M., Koushanfar, F., Potkonjak, M.: Lightweight secure PUFs. In: 2008 IEEE\/ACM International Conference on Computer-Aided Design, San Jose, CA, USA, pp. 670\u2013673. IEEE, November 2008. https:\/\/doi.org\/10.1109\/ICCAD.2008.4681648","DOI":"10.1109\/ICCAD.2008.4681648"},{"key":"7_CR20","doi-asserted-by":"publisher","unstructured":"Nguyen, P.H., Sahoo, D.P., Jin, C., Mahmood, K., R\u00fchrmair, U., Van Dijk, M.: The interpose PUF: secure PUF design against state-of-the-art machine learning attacks. TCHES, 243\u2013290 (2019). https:\/\/doi.org\/10.46586\/tches.v2019.i4.243-290","DOI":"10.46586\/tches.v2019.i4.243-290"},{"key":"7_CR21","doi-asserted-by":"publisher","first-page":"2485","DOI":"10.1109\/TIFS.2020.2968113","volume":"15","author":"SVS Avvaru","year":"2020","unstructured":"Avvaru, S.V.S., Zeng, Z., Parhi, K.K.: Homogeneous and heterogeneous feed-forward XOR physical unclonable functions. IEEE Trans. Inf. Forensics Secur. 15, 2485\u20132498 (2020). https:\/\/doi.org\/10.1109\/TIFS.2020.2968113","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR22","unstructured":"A multiplexer-based arbiter PUF composition with enhanced reliability and security. IEEE J. Mag.  https:\/\/ieeexplore.ieee.org\/document\/8025790. Accessed 22 Mar 2023"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1545-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T16:55:37Z","timestamp":1739379337000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1545-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819615445","9789819615452"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1545-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"13 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ica3pp2024.scimeeting.cn\/en\/web\/index\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}