A machine learning-based security vulnerability study on XOR PUFs for resource-constraint Internet of Things

Ahmad Aseeri, Yu Zhuang, Mohammed Alkatheiri

Research output: Contribution to conferencePaperpeer-review

Original languageEnglish
StatePublished - Jul 2018

Fingerprint

Dive into the research topics of 'A machine learning-based security vulnerability study on XOR PUFs for resource-constraint Internet of Things'. Together they form a unique fingerprint.

Cite this