{"id":"https://openalex.org/W4405845905","doi":"https://doi.org/10.1109/apccas62602.2024.10808901","title":"PUF-based Lightweight Authentication for Binarized Neural Networks","display_name":"PUF-based Lightweight Authentication for Binarized Neural Networks","publication_year":2024,"publication_date":"2024-11-07","ids":{"openalex":"https://openalex.org/W4405845905","doi":"https://doi.org/10.1109/apccas62602.2024.10808901"},"language":"en","primary_location":{"id":"doi:10.1109/apccas62602.2024.10808901","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apccas62602.2024.10808901","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026703155","display_name":"Gokulnath Rajendran","orcid":"https://orcid.org/0009-0006-0245-3283"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Gokulnath Rajendran","raw_affiliation_strings":["NTU,Singapore"],"affiliations":[{"raw_affiliation_string":"NTU,Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050798347","display_name":"S. Deb","orcid":"https://orcid.org/0000-0001-7631-9163"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Suman Deb","raw_affiliation_strings":["CREATE,Singapore"],"affiliations":[{"raw_affiliation_string":"CREATE,Singapore","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089860351","display_name":"Anupam Chattopadhyay","orcid":"https://orcid.org/0000-0002-8818-6983"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Anupam Chattopadhyay","raw_affiliation_strings":["NTU,Singapore"],"affiliations":[{"raw_affiliation_string":"NTU,Singapore","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5026703155"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.5188,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.68511117,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"447","last_page":"451"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.8741000294685364,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.8741000294685364,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.7631999850273132,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7175918817520142},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.658829391002655},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5782986283302307},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4329826235771179},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3718131184577942},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27853113412857056},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.23129871487617493}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7175918817520142},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.658829391002655},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5782986283302307},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4329826235771179},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3718131184577942},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27853113412857056},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.23129871487617493}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/apccas62602.2024.10808901","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apccas62602.2024.10808901","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320671","display_name":"National Research Foundation","ror":"https://ror.org/05s0g1g46"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2798554798","https://openalex.org/W2911173308","https://openalex.org/W3036924820","https://openalex.org/W3195943422","https://openalex.org/W3204198828","https://openalex.org/W4283751201","https://openalex.org/W4313389698","https://openalex.org/W4386226807","https://openalex.org/W4400229697","https://openalex.org/W6742083050","https://openalex.org/W6790920079"],"related_works":["https://openalex.org/W2166668397","https://openalex.org/W2116285675","https://openalex.org/W1533309011","https://openalex.org/W3048245612","https://openalex.org/W1980599209","https://openalex.org/W1555715488","https://openalex.org/W1991172351","https://openalex.org/W1510656496","https://openalex.org/W2061637199","https://openalex.org/W2997078490"],"abstract_inverted_index":{"Rapid":[0],"adoption":[1],"of":[2,18,33,51,54,75,104],"Neural":[3,77],"Networks":[4,78],"(NN)":[5],"for":[6,60],"various":[7],"applications":[8],"have":[9],"given":[10],"rise":[11],"to":[12,35,110],"concerns":[13],"about":[14],"protecting":[15],"the":[16,19,123],"ownership":[17],"Intellectual":[20],"Property":[21],"(IP).":[22],"Recent":[23],"proposals":[24],"in":[25,38,106],"that":[26],"direction":[27],"include":[28],"techniques":[29,42],"ranging":[30],"from":[31,45],"locking":[32],"NN":[34,113],"performing":[36],"computation":[37],"encrypted":[39],"domain.":[40],"These":[41],"either":[43],"suffer":[44],"high":[46],"performance":[47],"overhead":[48,137],"or":[49],"lack":[50],"concrete":[52],"guarantee":[53],"user":[55],"authentication.":[56],"Moreover,":[57],"key":[58,81,130],"management":[59,82],"large-scale":[61],"deployment":[62],"always":[63],"remains":[64],"a":[65,72,91,102],"challenge.":[66],"In":[67],"this":[68],"work,":[69],"we":[70,121],"propose":[71],"lightweight":[73],"authentication":[74],"Binarized":[76],"(BNN).":[79],"The":[80,94],"is":[83,97,129],"done":[84],"using":[85,99],"Physical":[86],"Unclonable":[87],"Functions":[88],"(PUF),":[89],"presenting":[90],"compact":[92],"solution.":[93],"entire":[95],"design":[96],"realized":[98],"RRAM":[100],"crossbars,":[101],"platform":[103],"choice":[105],"recent":[107],"times":[108],"due":[109],"highly":[111],"efficient":[112],"processing.":[114],"Through":[115],"formal":[116],"analysis":[117],"and":[118],"experimental":[119],"evaluations,":[120],"corroborate":[122],"security":[124],"claims":[125],"(${\\mathcal{O}}\\left(2^{n}\\right)$,":[126],"where":[127],"n":[128],"size)":[131],"as":[132,134],"well":[133],"low":[135],"power":[136],"(<1":[138],"%).":[139]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-05T09:29:38.588285","created_date":"2025-10-10T00:00:00"}
