Articles with "adversarial based" as a keyword



Photo from wikipedia

Enhancing Reliability and Security: A Configurable Poisoning PUF Against Modeling Attacks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"

DOI: 10.1109/tcad.2022.3197529

Abstract: Physically unclonable functions (PUFs) have been widely proposed as hardware primitives for device identification and cryptographic key generation. While strong PUFs provide an exponential number of challenge–response pairs (CRPs) for device authentication, most are vulnerable… read more here.

Keywords: reliability security; reliability; modeling attacks; adversarial based ... See more keywords
Photo from wikipedia

Adversarial RL-Based IDS for Evolving Data Environment in 6LoWPAN

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3214099

Abstract: Low-power and Lossy Networks (LLNs) comprise nodes characterised by constrained computational power, memory, and energy resources. The LLN nodes empower ubiquitous connections amongst numerous devices (e.g. temperature, humidity, and turbidity sensors, together with motors, valves… read more here.

Keywords: data environment; based ids; environment; adversarial based ... See more keywords