Author of the publication

An efficient modeling attack for breaking the security of XOR-Arbiter PUFs by using the fully connected and long-short term memory.

, , , and . Microprocess. Microsystems, (October 2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secrecy Performance Analysis of Backscatter Communications with Side Information., , , and . Sensors, 23 (20): 8358 (October 2023)Performance Analysis of RIS/STAR-IOS-Aided V2V NOMA/OMA Communications Over Composite Fading Channels., , and . IEEE Trans. Intell. Veh., 9 (1): 279-286 (January 2024)BatAu: A Batch Authentication Scheme for Backscatter Devices in a Smart Home Network., , , , , and . ICC, page 4528-4533. IEEE, (2023)TDMBBO: a novel three-dimensional migration model of biogeography-based optimization (case study: facility planning and benchmark problems)., , , and . J. Supercomput., 79 (9): 9715-9770 (June 2023)Secrecy Performance Analysis of RIS-Aided Fluid Antenna Systems., , , , , and . CoRR, (2024)RIS-Aided Backscattering Tag-to-Tag Networks: Performance Analysis., , , and . CoRR, (2024)Fluid Antenna Multiple Access with Simultaneous Non-unique Decoding in Strong Interference Channel., , , , , , and . CoRR, (2024)On Performance of FAS-Aided Wireless Powered NOMA Communication Systems., , , , and . WiMob, page 496-501. IEEE, (2024)An efficient modeling attack for breaking the security of XOR-Arbiter PUFs by using the fully connected and long-short term memory., , , and . Microprocess. Microsystems, (October 2022)A Summery of the First Workshop on Backscatter Communication Security in Internet of Things Environment., , , and . WF-IoT, page 1-2. IEEE, (2023)