{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:50:25Z","timestamp":1740102625355,"version":"3.37.3"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,13]],"date-time":"2023-12-13T00:00:00Z","timestamp":1702425600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,13]],"date-time":"2023-12-13T00:00:00Z","timestamp":1702425600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010814","name":"Anhui Provincial Department of Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100010814","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100014762","name":"Anhui Polytechnic University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100014762","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,13]]},"DOI":"10.1109\/asianhost59942.2023.10409383","type":"proceedings-article","created":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T18:36:47Z","timestamp":1706121407000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["A Lightweight and Machine-Learning-Resistant PUF framework based on Nonlinear Structure and Obfuscating Challenges"],"prefix":"10.1109","author":[{"given":"Tianming","family":"Ni","sequence":"first","affiliation":[{"name":"Anhui Polytechnic University,Anhui Engineering Research Center of Vehicle Display Integrated Systems,School of Integrated Circuits,Wuhu 241000,China"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Fei","family":"Li","sequence":"additional","affiliation":[{"name":"Anhui Polytechnic University,Anhui Engineering Research Center of Vehicle Display Integrated Systems,School of Integrated Circuits,Wuhu 241000,China"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Qingsong","family":"Peng","sequence":"additional","affiliation":[{"name":"Hefei University of Technology,School of Microelectronics,China"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Senling","family":"Wang","sequence":"additional","affiliation":[{"name":"Ehime University,Graduate School of Science and Engineering"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Xiaoqing","family":"Wen","sequence":"additional","affiliation":[{"name":"Kyushu Institute of Technology,Graduate School of Computer Science and Systems Engineering,Japan"}],"role":[{"role":"author","vocab":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/hst.2008.4559053"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3053681"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2017.2733582"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2279798"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2019.00073"},{"article-title":"PUF-AES-PUF: A novel PUF architecture against non-invasive attacks[J]","year":"2018","author":"Yu","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/tcad.2022.3197539"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/tetc.2019.2935465"},{"key":"ref9","first-page":"9","article-title":"Physical Unclonable Functions for Device Authentication and Secret Key Generation","volume-title":"2007 44th ACM\/IEEE Design Automation Conference","author":"Suh"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9050815"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/tcad.2017.2740297"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/tvlsi.2021.3111588"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2020.3028508"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3090475"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3194554.3194590"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST.2016.7835567"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2016.7457162"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2017.8050628"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/tvlsi.2022.3189953"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-32494-1_4"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2014.362"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2749226"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9088-4"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/iscas.2016.7527301"}],"event":{"name":"2023 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","start":{"date-parts":[[2023,12,13]]},"location":"Tianjin, China","end":{"date-parts":[[2023,12,15]]}},"container-title":["2023 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10409268\/10409304\/10409383.pdf?arnumber=10409383","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T07:54:22Z","timestamp":1706774062000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10409383\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,13]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/asianhost59942.2023.10409383","relation":{},"subject":[],"published":{"date-parts":[[2023,12,13]]}}}