{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:20:31Z","timestamp":1778602831706,"version":"3.51.4"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/wifs.2012.6412622","type":"proceedings-article","created":{"date-parts":[[2013,1,25]],"date-time":"2013-01-25T19:44:59Z","timestamp":1359143099000},"page":"37-42","source":"Crossref","is-referenced-by-count":111,"title":["Machine learning attacks on 65nm Arbiter PUFs: Accurate modeling poses strict bounds on usability"],"prefix":"10.1109","author":[{"given":"Gabriel","family":"Hospodar","sequence":"first","affiliation":[]},{"given":"Roel","family":"Maes","sequence":"additional","affiliation":[]},{"given":"Ingrid","family":"Verbauwhede","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","author":"kevenaar","year":"2007","journal-title":"Security With Noisy Data"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"11","first-page":"586","article-title":"A direct adaptive method for faster back-propagation learning: The RProp algorithm","author":"riedmiller","year":"0","journal-title":"IEEE Intl Conference on Neural Networks 1993"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1126\/science.1074376"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-642-14452-3_1","article-title":"Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions","author":"maes","year":"2010","journal-title":"Towards Hardware-Intrinsic Security"},{"key":"1","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1145\/586110.586132","article-title":"Silicon physical random functions","author":"gassend","year":"2002","journal-title":"ACM CCS"},{"key":"10","article-title":"The perceptron - A perceiving and recognizing automaton","author":"rosenblatt","year":"1957","journal-title":"Cornell Aeronautical Laboratory Report"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681648"},{"key":"6","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1278480.1278484","article-title":"physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"2007 44th ACM\/IEEE Design Automation Conference DAC"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866335"},{"key":"4","first-page":"3194","author":"ozturk","year":"2008","journal-title":"Physical Unclonable Function with Tristate Buffers"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/0893-6080(91)90009-T"},{"key":"8","author":"mitchell","year":"1997","journal-title":"Machine Learning"}],"event":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","location":"Costa Adeje - Tenerife, Spain","start":{"date-parts":[[2012,12,2]]},"end":{"date-parts":[[2012,12,5]]}},"container-title":["2012 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6395850\/6412607\/06412622.pdf?arnumber=6412622","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,5]],"date-time":"2024-05-05T06:23:58Z","timestamp":1714890238000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6412622\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/wifs.2012.6412622","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}