Picture for Yu Zhuang

Yu Zhuang

PhysSFI-Net: Physics-informed Geometric Learning of Skeletal and Facial Interactions for Orthognathic Surgical Outcome Prediction

Add code
Jan 06, 2026
Viaarxiv icon

Fast Clustering of Categorical Big Data

Add code
Feb 10, 2025
Viaarxiv icon

Designing Short-Stage CDC-XPUFs: Balancing Reliability, Cost, and Security in IoT Devices

Add code
Sep 26, 2024
Figure 1 for Designing Short-Stage CDC-XPUFs: Balancing Reliability, Cost, and Security in IoT Devices
Figure 2 for Designing Short-Stage CDC-XPUFs: Balancing Reliability, Cost, and Security in IoT Devices
Figure 3 for Designing Short-Stage CDC-XPUFs: Balancing Reliability, Cost, and Security in IoT Devices
Figure 4 for Designing Short-Stage CDC-XPUFs: Balancing Reliability, Cost, and Security in IoT Devices
Viaarxiv icon

A novel reliability attack of Physical Unclonable Functions

Add code
May 21, 2024
Viaarxiv icon

Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device

Add code
Oct 04, 2022
Figure 1 for Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device
Figure 2 for Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device
Figure 3 for Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device
Figure 4 for Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device
Viaarxiv icon

A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks

Add code
Jun 02, 2022
Figure 1 for A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks
Figure 2 for A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks
Figure 3 for A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks
Figure 4 for A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks
Viaarxiv icon