Author of the publication

An efficient modeling attack for breaking the security of XOR-Arbiter PUFs by using the fully connected and long-short term memory.

, , , and . Microprocess. Microsystems, (October 2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Analysis of RIS/STAR-IOS-Aided V2V NOMA/OMA Communications Over Composite Fading Channels., , and . IEEE Trans. Intell. Veh., 9 (1): 279-286 (January 2024)Secrecy Performance Analysis of Backscatter Communications with Side Information., , , and . Sensors, 23 (20): 8358 (October 2023)BatAu: A Batch Authentication Scheme for Backscatter Devices in a Smart Home Network., , , , , and . ICC, page 4528-4533. IEEE, (2023)TDMBBO: a novel three-dimensional migration model of biogeography-based optimization (case study: facility planning and benchmark problems)., , , and . J. Supercomput., 79 (9): 9715-9770 (June 2023)On Performance of FAS-aided Wireless Powered NOMA Communication Systems., , , , and . CoRR, (2024)An efficient modeling attack for breaking the security of XOR-Arbiter PUFs by using the fully connected and long-short term memory., , , and . Microprocess. Microsystems, (October 2022)A Summery of the First Workshop on Backscatter Communication Security in Internet of Things Environment., , , and . WF-IoT, page 1-2. IEEE, (2023)An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication., and . Frontiers Inf. Technol. Electron. Eng., 22 (7): 1010-1019 (2021)Secure Wireless Powered Communications Under Fisher-Snedecor $F$ Fading Channels., , , and . WF-IoT, page 1-5. IEEE, (2023)A Survey on AI-Enabled Attacks and AI-Empowered Countermeasures in Physical Layer., , , , , and . WF-IoT, page 1-7. IEEE, (2023)