{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:58:54Z","timestamp":1763499534859,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/bigdata47090.2019.9006041","type":"proceedings-article","created":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T01:05:34Z","timestamp":1582592734000},"page":"3165-3171","source":"Crossref","is-referenced-by-count":21,"title":["Examination of Double Arbiter PUFs on Security against Machine Learning Attacks"],"prefix":"10.1109","author":[{"given":"Meznah A.","family":"Alamro","sequence":"first","affiliation":[]},{"given":"Yu","family":"Zhuang","sequence":"additional","affiliation":[]},{"given":"Ahmad O.","family":"Aseeri","sequence":"additional","affiliation":[]},{"given":"Mohammed Saeed","family":"Alkatheiri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0907-3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_17"},{"key":"ref12","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"arXiv preprint arXiv 1412 6980"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2005.859470"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2015.7058919"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/864812"},{"key":"ref16","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref17","first-page":"237","article-title":"Modeling attacks on physical unclonable functions","author":"r\u00fchrmair","year":"2010","journal-title":"Proceedings of the 17th ACM Conference on Computer and Communications Security"},{"article-title":"On the architectural analysis of arbiter delay puf variants","year":"0","author":"prasad sahoo","key":"ref18"},{"key":"ref19","first-page":"57","article-title":"Architectural bias: a novel statistical metric to evaluate arbiter puf variants","volume":"2016","author":"sahoo","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1007\/978-3-319-22846-4_2","article-title":"Why attackers win: on the learnability of xor arbiter pufs","author":"ganji","year":"2015","journal-title":"International Conference on Trust and Trustworthy Computing(TRUST 2010)"},{"key":"ref6","first-page":"315","article-title":"Deep sparse rectifier neural networks","author":"glorot","year":"2011","journal-title":"Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.805"},{"key":"ref8","first-page":"1034","article-title":"Dimensionality dependent pac-bayes margin bound","author":"jin","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2320516"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOT.2018.00014"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/DESEC.2017.8073845"},{"journal-title":"Making large-scale SVM learning practical","year":"1998","author":"joachims","key":"ref9"},{"key":"ref20","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","author":"edward suh","year":"2007","journal-title":"2007 44th ACM\/IEEE Design Automation Conference"},{"key":"ref22","first-page":"725","article-title":"Bias-variance analysis of support vector machines for the development of svm-based ensemble methods","volume":"5","author":"valentini","year":"2004","journal-title":"Journal of Machine Learning Research"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24837-0_2"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2016.2553027"}],"event":{"name":"2019 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2019,12,9]]},"location":"Los Angeles, CA, USA","end":{"date-parts":[[2019,12,12]]}},"container-title":["2019 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8986695\/9005444\/09006041.pdf?arnumber=9006041","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:50:28Z","timestamp":1658080228000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9006041\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/bigdata47090.2019.9006041","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}