{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T06:30:46Z","timestamp":1768977046787,"version":"3.49.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T00:00:00Z","timestamp":1702857600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T00:00:00Z","timestamp":1702857600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11432-022-3722-8","type":"journal-article","created":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T09:02:42Z","timestamp":1703235762000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A strong physical unclonable function with machine learning immunity for Internet of Things application"],"prefix":"10.1007","volume":"67","author":[{"given":"Pengpeng","family":"Ren","sequence":"first","affiliation":[]},{"given":"Yongkang","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Linglin","family":"Jing","sequence":"additional","affiliation":[]},{"given":"Lining","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Runsheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhigang","family":"Ji","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,18]]},"reference":[{"key":"3722_CR1","doi-asserted-by":"publisher","first-page":"151301","DOI":"10.1007\/s11432-021-3351-5","volume":"65","author":"Z Q Wang","year":"2022","unstructured":"Wang Z Q, Du Y, Wei K J, et al. Vision, application scenarios, and key technology trends for 6G mobile communications. Sci China Inf Sci, 2022, 65: 151301","journal-title":"Sci China Inf Sci"},{"key":"3722_CR2","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W S Shi","year":"2016","unstructured":"Shi W S, Cao J, Zhang Q, et al. Edge computing: vision and challenges. IEEE Int Things J, 2016, 3: 637\u2013646","journal-title":"IEEE Int Things J"},{"key":"3722_CR3","doi-asserted-by":"publisher","first-page":"182301","DOI":"10.1007\/s11432-021-3328-y","volume":"65","author":"D H Cai","year":"2022","unstructured":"Cai D H, Fan P Z, Zou Q Y, et al. Active device detection and performance analysis of massive non-orthogonal transmissions in cellular Internet of Things. Sci China Inf Sci, 2022, 65: 182301","journal-title":"Sci China Inf Sci"},{"key":"3722_CR4","doi-asserted-by":"publisher","first-page":"130304","DOI":"10.1007\/s11432-022-3626-5","volume":"66","author":"J D Xu","year":"2023","unstructured":"Xu J D, Yuen C, Huang C W, et al. Reconfiguring wireless environments via intelligent surfaces for 6G: reflection, modulation, and security. Sci China Inf Sci, 2023, 66: 130304","journal-title":"Sci China Inf Sci"},{"key":"3722_CR5","doi-asserted-by":"crossref","unstructured":"Suh G E, Devadas S. Physical unclonable functions for device authentication and secret key generation. In: Proceedings of the 44th ACM\/IEEE Design Automation Conference, 2007. 9\u201314","DOI":"10.1145\/1278480.1278484"},{"key":"3722_CR6","doi-asserted-by":"publisher","first-page":"122405","DOI":"10.1007\/s11432-021-3270-8","volume":"65","author":"S Zhang","year":"2022","unstructured":"Zhang S, Zhang J, Li S H, et al. Reconfigurable physical unclonable cryptographic primitives based on current-induced nanomagnets switching. Sci China Inf Sci, 2022, 65: 122405","journal-title":"Sci China Inf Sci"},{"key":"3722_CR7","doi-asserted-by":"crossref","unstructured":"Gassend B, Clarke D, Van Dijk M, et al. Controlled physical random functions. In: Proceedings of the 18th Annual Computer Security Applications Conference, 2002. 149\u2013160","DOI":"10.1145\/586110.586132"},{"key":"3722_CR8","doi-asserted-by":"crossref","unstructured":"Jeloka S, Yang K, Orshansky M, et al. A sequence dependent challenge-response PUF using 28nm SRAM 6T bit cell. In: Proceedings of Symposium on VLSI Circuits, 2017. 270\u2013271","DOI":"10.23919\/VLSIC.2017.8008504"},{"key":"3722_CR9","first-page":"3138","volume":"64","author":"C Q Liu","year":"2017","unstructured":"Liu C Q, Cao Y, Chang C H. ACRO-PUF: a low-power, reliable and aging-resilient current starved inverter-based ring oscillator physical unclonable function. IEEE Trans Circ Syst I, 2017, 64: 3138\u20133149","journal-title":"IEEE Trans Circ Syst I"},{"key":"3722_CR10","doi-asserted-by":"publisher","first-page":"1142","DOI":"10.1109\/JPROC.2014.2331553","volume":"102","author":"M Potkonjak","year":"2014","unstructured":"Potkonjak M, Goudar V. Public physical unclonable functions. Proc IEEE, 2014, 102: 1142\u20131156","journal-title":"Proc IEEE"},{"key":"3722_CR11","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1038\/s41928-020-0372-5","volume":"3","author":"Y S Gao","year":"2020","unstructured":"Gao Y S, Al-Sarawi S F, Abbott D. Physical unclonable functions. Nat Electron, 2020, 3: 81\u201391","journal-title":"Nat Electron"},{"key":"3722_CR12","doi-asserted-by":"publisher","first-page":"1126","DOI":"10.1109\/JPROC.2014.2320516","volume":"102","author":"C Herder","year":"2014","unstructured":"Herder C, Yu M D, Koushanfar F, et al. Physical unclonable functions and applications: a tutorial. Proc IEEE, 2014, 102: 1126\u20131141","journal-title":"Proc IEEE"},{"key":"3722_CR13","doi-asserted-by":"crossref","unstructured":"Awano H, Sato T. Ising-PUF: a machine learning attack resistant PUF featuring lattice like arrangement of arbiter-PUFs. In: Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE), 2018. 1447\u20131452","DOI":"10.23919\/DATE.2018.8342239"},{"key":"3722_CR14","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.microrel.2011.09.002","volume":"52","author":"T Grasser","year":"2012","unstructured":"Grasser T. Stochastic charge trapping in oxides: from random telegraph noise to bias temperature instabilities. MicroElectron Reliab, 2012, 52: 39\u201370","journal-title":"MicroElectron Reliab"},{"key":"3722_CR15","doi-asserted-by":"crossref","unstructured":"Grasser T, Reisinger H, Goes W, et al. Switching oxide traps as the missing link between negative bias temperature instability and random telegraph noise. In: Proceedings of IEEE International Electron Devices Meeting (IEDM), 2009. 1\u20134","DOI":"10.1109\/IEDM.2009.5424235"},{"key":"3722_CR16","doi-asserted-by":"publisher","first-page":"226401","DOI":"10.1007\/s11432-019-2643-5","volume":"62","author":"Z G Ji","year":"2019","unstructured":"Ji Z G, Chen H B, Li X Y. Design for reliability with the advanced integrated circuit (IC) technology: challenges and opportunities. Sci China Inf Sci, 2019, 62: 226401","journal-title":"Sci China Inf Sci"},{"key":"3722_CR17","doi-asserted-by":"crossref","unstructured":"Ren P, Gao R, Ji Z, et al. Understanding charge traps for optimizing Si-passivated Ge nMOSFETs. In: Proceedings of IEEE Symposium on VLSI Technology, 2016. 1\u20132","DOI":"10.1109\/VLSIT.2016.7573367"},{"key":"3722_CR18","doi-asserted-by":"publisher","first-page":"3633","DOI":"10.1109\/TED.2015.2475604","volume":"62","author":"Z G Ji","year":"2015","unstructured":"Ji Z G, Zhang X, Franco J, et al. An investigation on border traps in III\u2013V MOSFETs with an In0.53Ga0.47As channel. IEEE Trans Electron Dev, 2015, 62: 3633\u20133639","journal-title":"IEEE Trans Electron Dev"},{"key":"3722_CR19","doi-asserted-by":"crossref","unstructured":"Brown J, Gao R, Ji Z G, et al. A low-power and high-speed true random number generator using generated RTN. In: Proceedings of IEEE Symposium on VLSI Technology, 2018. 95\u201396","DOI":"10.1109\/VLSIT.2018.8510671"},{"key":"3722_CR20","doi-asserted-by":"publisher","first-page":"674","DOI":"10.1109\/LED.2019.2903516","volume":"40","author":"X P Zhan","year":"2019","unstructured":"Zhan X P, Shen C D, Ji Z G, et al. A dual-point technique for the entire ID\u2212VG characterization into subthreshold region under random telegraph noise condition. IEEE Electron Dev Lett, 2019, 40: 674\u2013677","journal-title":"IEEE Electron Dev Lett"},{"key":"3722_CR21","doi-asserted-by":"publisher","first-page":"245318","DOI":"10.1103\/PhysRevB.82.245318","volume":"82","author":"T Grasser","year":"2010","unstructured":"Grasser T, Reisinger H, Wagner P J, et al. Time-dependent defect spectroscopy for characterization of border traps in metal-oxide-semiconductor transistors. Phys Rev B, 2010, 82: 245318","journal-title":"Phys Rev B"},{"key":"3722_CR22","doi-asserted-by":"crossref","unstructured":"Nagumo T, Takeuchi K, Hase T, et al. Statistical characterization of trap position, energy, amplitude and time constants by RTN measurement of multiple individual traps. In: Proceedings of International Electron Devices Meeting, 2010","DOI":"10.1109\/IEDM.2010.5703437"},{"key":"3722_CR23","doi-asserted-by":"crossref","unstructured":"Chen J, Tanamoto T, Noguchi H, et al. Further investigations on traps stabilities in random telegraph signal noise and the application to a novel concept physical unclonable function (PUF) with robust reliabilities. In: Proceedings of Symposium on VLSI Technology, 2015. 40\u201341","DOI":"10.1109\/VLSIT.2015.7223695"},{"key":"3722_CR24","doi-asserted-by":"crossref","unstructured":"Mathew S K, Satpathy S K, Anders M A, et al. 16.2 A 0.19 pJ\/b PVT-variation-tolerant hybrid physically unclonable function circuit for 100 stable secure key generation in 22nm CMOS. In: Proceedings of the IEEE International Solid-State Circuits Conference, 2014. 278\u2013279","DOI":"10.1109\/ISSCC.2014.6757433"},{"key":"3722_CR25","doi-asserted-by":"publisher","first-page":"2","DOI":"10.3390\/jlpea7010002","volume":"7","author":"A Vijayakumar","year":"2017","unstructured":"Vijayakumar A, Patil V, Kundu S. On improving reliability of SRAM-based physically unclonable functions. J Low Power Electron Appl, 2017, 7: 2","journal-title":"J Low Power Electron Appl"},{"key":"3722_CR26","doi-asserted-by":"publisher","first-page":"17210","DOI":"10.1038\/s41598-020-74351-y","volume":"10","author":"J Brown","year":"2020","unstructured":"Brown J, Zhang J F, Zhou B, et al. Random-telegraph-noise-enabled true random number generator for hardware security. Sci Rep, 2020, 10: 17210","journal-title":"Sci Rep"},{"key":"3722_CR27","doi-asserted-by":"crossref","unstructured":"Wang S J, Chen Y S, Li K S M. Adversarial attack against modeling attack on PUFs. In: Proceedings of the 56th ACM\/IEEE Design Automation Conference (DAC), 2019. 1\u20136","DOI":"10.1145\/3316781.3317761"},{"key":"3722_CR28","doi-asserted-by":"crossref","unstructured":"Majzoobi M, Koushanfar F, Potkonjak M. Lightweight secure PUFs. In: Proceedings of the IEEE\/ACM International Conference on Computer-Aided Design, 2008. 670\u2013673","DOI":"10.1109\/ICCAD.2008.4681648"},{"key":"3722_CR29","doi-asserted-by":"crossref","unstructured":"Maiti A, Gunreddy V, Schaumont P. A systematic method to evaluate and compare the performance of physical unclonable functions. 2013. https:\/\/eprint.iacr.org\/2011\/657.pdf","DOI":"10.1007\/978-1-4614-1362-2_11"},{"key":"3722_CR30","doi-asserted-by":"crossref","unstructured":"Liu C, Lee K T, Lee H, et al. New observations on the random telegraph noise induced Vth variation in nano-scale MOSFETs. In: Proceedings of IEEE International Reliability Physics Symposium, 2014","DOI":"10.1109\/IRPS.2014.6861194"},{"key":"3722_CR31","doi-asserted-by":"crossref","unstructured":"Rahman M T, Forte D, Fahrny J, et al. ARO-PUF: an aging-resistant ring oscillator PUF design. In: Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE), 2014. 1\u20136","DOI":"10.7873\/DATE2014.082"},{"key":"3722_CR32","doi-asserted-by":"crossref","unstructured":"Zhou C, Parhi K K, Kim C H. Secure and reliable XOR arbiter PUF design: an experimental study based on 1 trillion challenge response pair measurements. In: Proceedings of the 54th Annual Design Automation Conference, 2017. 1\u20136","DOI":"10.1145\/3061639.3062315"},{"key":"3722_CR33","doi-asserted-by":"crossref","unstructured":"Suresh V, Kumar R, Anders M, et al. A 0.26 BER, 1028 challenge-response machine-learning resistant strong-PUF in 14nm CMOS featuring stability-aware adversarial challenge selection. In: Proceedings of IEEE Symposium on VLSI Circuits, 2020. 1\u20132","DOI":"10.1109\/VLSICircuits18222.2020.9162890"},{"key":"3722_CR34","doi-asserted-by":"crossref","unstructured":"Simicic M, Morrison S, Parvais B, et al. A fully-integrated method for RTN parameter extraction. In: Proceedings of Symposium on VLSI Technology, 2017. 132\u2013133","DOI":"10.23919\/VLSIT.2017.7998151"},{"key":"3722_CR35","unstructured":"Liu S, Baker R J. Process and temperature performance of a CMOS beta-multiplier voltage reference. In: Proceedings of Midwest Symposium on Circuits and Systems, 1998. 33\u201336"},{"key":"3722_CR36","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1109\/JSSC.1977.1050882","volume":"12","author":"E Vittoz","year":"1977","unstructured":"Vittoz E, Fellrath J. CMOS analog integrated circuits based on weak inversion operations. IEEE J Solid-State Circ, 1977, 12: 224\u2013231","journal-title":"IEEE J Solid-State Circ"},{"key":"3722_CR37","doi-asserted-by":"crossref","unstructured":"Hospodar G, Maes R, Verbauwhede I. Machine learning attacks on 65nm arbiter PUFs: accurate modeling poses strict bounds on usability. In: Proceedings of IEEE International Workshop on Information Forensics and Security (WIFS), 2012. 37\u201342","DOI":"10.1109\/WIFS.2012.6412622"},{"key":"3722_CR38","first-page":"135","volume":"67","author":"H Y Zhuang","year":"2019","unstructured":"Zhuang H Y, Xi X D, Sun N, et al. A strong subthreshold current array PUF resilient to machine learning attacks. IEEE Trans Circ Syst I, 2019, 67: 135\u2013144","journal-title":"IEEE Trans Circ Syst I"},{"key":"3722_CR39","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair U, Sehnke F, S\u00f6lter J, et al. Modeling attacks on physical unclonable functions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010. 237\u2013249","DOI":"10.1145\/1866307.1866335"},{"key":"3722_CR40","doi-asserted-by":"publisher","first-page":"1876","DOI":"10.1109\/TIFS.2013.2279798","volume":"8","author":"U Ruhrmair","year":"2013","unstructured":"Ruhrmair U, Solter J, Sehnke F, et al. PUF modeling attacks on simulated and silicon data. IEEE Trans Inform Forensic Secur, 2013, 8: 1876\u20131891","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"3722_CR41","unstructured":"Riedmiller M, Braun H. A direct adaptive method for faster backpropagation learning: the RPROP algorithm. In: Proceedings of the IEEE International Conference on Neural Networks, 1993. 586\u2013591"},{"key":"3722_CR42","first-page":"1471","volume":"11","author":"Y W Chang","year":"2010","unstructured":"Chang Y W, Hsieh C J, Chang K W, et al. Training and testing low-degree polynomial data mappings via linear SVM. J Mach Learn Res, 2010, 11: 1471\u20131490","journal-title":"J Mach Learn Res"},{"key":"3722_CR43","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/0893-6080(89)90020-8","volume":"2","author":"K Hornik","year":"1989","unstructured":"Hornik K, Stinchcombe M, White H. Multilayer feedforward networks are universal approximators. Neural Netw, 1989, 2: 359\u2013366","journal-title":"Neural Netw"},{"key":"3722_CR44","unstructured":"Nair V, Hinton G E. Rectified linear units improve restricted Boltzmann machines. In: Proceedings of the 27th International Conference on International Conference on Machine Learning, 2010"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-022-3722-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-022-3722-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-022-3722-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T14:14:31Z","timestamp":1746627271000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-022-3722-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,18]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["3722"],"URL":"https:\/\/doi.org\/10.1007\/s11432-022-3722-8","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,18]]},"assertion":[{"value":"11 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 December 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"112404"}}