Deep learning for computational problems in hardware security : (Record no. 7360)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01670 a2200193 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20251114142429.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250915b |||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9789811940163 |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.82 |
| Item number | SanD |
| 100 ## - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Pranesh Santikellur |
| 245 ## - TITLE STATEMENT | |
| Title | Deep learning for computational problems in hardware security : |
| Remainder of title | modeling attacks on strong physically unclonable function circuits / |
| Statement of responsibility, etc | Pranesh Santikellur and Rajat Subhra Chakraborty. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication | Singapore: |
| Name of publisher | Springer, |
| Year of publication | ©2021, |
| 300 ## - PHYSICAL DESCRIPTION | |
| Number of Pages | xi, 84p. |
| 440 ## - SERIES STATEMENT/ADDED ENTRY--TITLE | |
| Title | Studies in Computational Intelligence |
| Volume number/sequential designation | v. 1052 |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | The book discusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware security applications, in particular the techniques of launching potent "modeling attacks" on Physically Unclonable Function (PUF) circuits, which are promising hardware security primitives. The volume is self-contained and includes a comprehensive background on PUF circuits, and the necessary mathematical foundation of traditional and advanced machine learning techniques such as support vector machines, logistic regression, neural networks, and deep learning. This book can be used as a self-learning resource for researchers and practitioners of hardware security, and will also be suitable for graduate-level courses on hardware security and application of machine learning in hardware security. A stand-out feature of the book is the availability of reference software code and datasets to replicate the experiments described in the book. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Machine Learning |
| General subdivision | Basics |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Chakraborty, Rajat Subhra |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | Books |
| Withdrawn status | Lost status | Damaged status | Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Purchase Price | Bill number | Full call number | Accession Number | Print Price | Bill Date/Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Electrical | Indian Institute of Technology Tirupati | Indian Institute of Technology Tirupati | General Stacks | 15/09/2025 | Shankar's Book Agency Pvt. Ltd. | 7016.10 | IN35911/25-26 | 005.82 SanD (11636) | 11636 | 10023.00 | 15/09/2025 | Books |