{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T17:52:25Z","timestamp":1762624345048,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/asianhost47458.2019.9006686","type":"proceedings-article","created":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T05:07:41Z","timestamp":1582607261000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Design of a Chaotic Oscillator based Model Building Attack Resistant Arbiter PUF"],"prefix":"10.1109","author":[{"given":"Venkata Sreekanth","family":"Balijabudda","sequence":"first","affiliation":[]},{"given":"Dhruv","family":"Thapar","sequence":"additional","affiliation":[]},{"given":"Pranesh","family":"Santikellur","sequence":"additional","affiliation":[]},{"given":"Rajat Subhra","family":"Chakraborty","sequence":"additional","affiliation":[]},{"given":"Indrajit","family":"Chakrabarti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","first-page":"599","article-title":"A practical guide to training restricted boltzmann machines","author":"geoffrey e","year":"2012","journal-title":"Neural Networks Tricks of the Trade"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"5947","DOI":"10.4249\/scholarpedia.5947","article-title":"Deep belief networks","volume":"4","author":"geoffrey e","year":"2009","journal-title":"Scholarpedia"},{"key":"ref30","first-page":"1408","article-title":"Lorenz chaotic system-based carbon nanotube physical unclonable functions","volume":"37","author":"lin","year":"2017","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1175\/1520-0469(1963)020<0130:DNF>2.0.CO;2"},{"key":"ref11","first-page":"495","article-title":"Hardware implementation of lorenz circuit systems for secure chaotic communication applications","volume":"13","author":"hsin-chieh","year":"2013","journal-title":"Sensors (Basel Switzerland)"},{"key":"ref12","article-title":"Simple chaotic systems and circuits","volume":"68","author":"julien clinton","year":"2000","journal-title":"American Journal of Physics"},{"key":"ref13","first-page":"240","article-title":"Simple chaotic systems and circuits","volume":"58","author":"sprott","year":"2011","journal-title":"A New Chaotic Jerk Circuit"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1987.13847"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1109\/TCSI.2002.808217","article-title":"Mos realization of the double-scroll-like chaotic equation","volume":"50","author":"el-sedeek","year":"2003","journal-title":"IEEE Transactions on Circuits and Systems I Fundamental Theory and Applications"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"829","DOI":"10.1049\/el:19980621","article-title":"Implementation of chua's chaotic circuit using current feedback op-amps","volume":"34","author":"gupta","year":"1998","journal-title":"Electronics Letters"},{"key":"ref17","article-title":"Robust op amp realization of chua's circuit","volume":"46","author":"kennedy","year":"1994","journal-title":"Frequenz"},{"key":"ref18","first-page":"657","article-title":"A Systematic Method to Evaluate and Compare the Performance of Physical Unclon-able Functions","volume":"2011","author":"abhranil","year":"2011","journal-title":"IACR Cryptology ePrint Archive"},{"journal-title":"Theory and Practice of Error Control Codes","year":"1983","author":"blahut","key":"ref19"},{"key":"ref4","article-title":"On design of a highly secure puf based on non-linear current mirrors","author":"burleson","year":"2014","journal-title":"2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)"},{"key":"ref28","article-title":"A Method for Stochastic Optimization","author":"kingma","year":"2015","journal-title":"Proceedings of the International Conference on Learning Representations"},{"key":"ref3","article-title":"On the foundations of physical unclonable functions","author":"r\u00fchrmair","year":"2009","journal-title":"Cryptology ePrint Archive"},{"key":"ref27","first-page":"249","article-title":"Understanding the difficulty of training deep feedforward neural networks","author":"xavier","year":"2010","journal-title":"Proceedings of the International Conference on Artificial Intelligence and Statistics"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1408","DOI":"10.1109\/TCAD.2017.2762919","article-title":"Lorenz chaotic system-based carbon nanotube physical unclonable functions","volume":"37","author":"shiyan","year":"2018","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1109\/TMSCS.2016.2553027","article-title":"A lockdown technique to prevent machine learning on pufs for lightweight authentication","volume":"2","author":"delvaux","year":"2016","journal-title":"IEEE Transactions on Multi-Scale Computing Systems"},{"key":"ref29","first-page":"807","article-title":"Rectified Linear Units Improve Restricted Boltzmann Machines","author":"vinod","year":"2010","journal-title":"Proceedings of the International Conference on Machine Learning"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1195","DOI":"10.1016\/j.physleta.2018.03.012","article-title":"A framework to enhance security of physically unclonable functions using chaotic circuits","volume":"382","author":"lanxiang","year":"2018","journal-title":"Physics Letters A"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1109\/TCAD.2012.2187527","article-title":"Carbon nanotube robust digital vlsi","volume":"31","author":"nishant","year":"2012","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"ref2","article-title":"Attacks on physically-embedded data encryption for embedded devices","author":"guoqiang","year":"2014","journal-title":"2014 IEEE 13th International Conference on Trust Security and Privacy in Computing and Communications"},{"key":"ref9","first-page":"189","author":"barbareschi","year":"2017","journal-title":"Notions on Silicon Physically Unclonable Functions"},{"key":"ref1","article-title":"Modeling attacks on physical unclonable functions","author":"r\u00fchrmair","year":"2010","journal-title":"Cryptology ePrint Archive"},{"journal-title":"Extracting secret keys from integrated circuits","year":"2004","author":"lim","key":"ref20"},{"key":"ref22","article-title":"Deep learning based model building attacks on arbiter puf compositions","author":"santikellur","year":"2019","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref21","first-page":"237","article-title":"Modeling attacks on Physical Unclonable Functions","author":"r\u00fchrmair","year":"2010","journal-title":"Proceedings of the ACM Conference on Computer and Communications Security"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/0893-6080(89)90020-8"},{"key":"ref23","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref26","first-page":"265","article-title":"TensorFlow: A System for Large-scale Machine Learning","author":"mart\u00edn","year":"2016","journal-title":"Proc USENIX Symp on Operating System Design and Implementation"},{"journal-title":"Keras","year":"2015","author":"fran\u00e7ois","key":"ref25"}],"event":{"name":"2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","start":{"date-parts":[[2019,12,16]]},"location":"Xi'an, China","end":{"date-parts":[[2019,12,17]]}},"container-title":["2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8976189\/9006656\/09006686.pdf?arnumber=9006686","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:53:26Z","timestamp":1658094806000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9006686\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/asianhost47458.2019.9006686","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}