Picture for Yu Zhuang

Yu Zhuang

Fast Clustering of Categorical Big Data

Add code
Feb 10, 2025
Viaarxiv icon

Designing Short-Stage CDC-XPUFs: Balancing Reliability, Cost, and Security in IoT Devices

Add code
Sep 26, 2024
Viaarxiv icon

A novel reliability attack of Physical Unclonable Functions

Add code
May 21, 2024
Viaarxiv icon

Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device

Add code
Oct 04, 2022
Figure 1 for Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device
Figure 2 for Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device
Figure 3 for Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device
Figure 4 for Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device
Viaarxiv icon

A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks

Add code
Jun 02, 2022
Figure 1 for A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks
Figure 2 for A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks
Figure 3 for A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks
Figure 4 for A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks
Viaarxiv icon