Advanced Photonics, Volume. 6, Issue 5, 056002(2024)
Authentication through residual attention-based processing of tampered optical responses On the Cover
[5] B. Wilson et al. Empowering quantum 2.0 devices and approaches with machine learning, QTu2A.13(2022).
[7] Y. Yao et al. Clockpuf: physical unclonable functions based on clock networks, 422-427(2013).
[12] P. Ebenezer. Counterfeit mitigation with PUF-embedded readout(2020).
[13] U. Rührmair, S. Devadas, F. Koushanfar. Introduction to Hardware Security and Trust(2012).
[15] B. Gassend et al. Silicon physical random functions, 148-160(2002).
[16] R. Maes. Physically Unclonable Functions, 49-80(2013).
[26] J. Guenette et al. MR imaging of the extracranial facial nerve with the CISS sequence. Am. J. Neuroradiol., 40, 1954-1959(2019).
[31] A. Vaswani et al. Attention is all you need(2017).
[41] M. Hamilton et al. Unsupervised semantic segmentation by distilling feature correspondences(2022).
[43] R. Pathria, P. D. Beale. Statistical Mechanics(2011).
Get Citation
Copy Citation Text
Blake Wilson, Yuheng Chen, Daksh Kumar Singh, Rohan Ojha, Jaxon Pottle, Michael Bezick, Alexandra Boltasseva, Vladimir M. Shalaev, Alexander V. Kildishev, "Authentication through residual attention-based processing of tampered optical responses," Adv. Photon. 6, 056002 (2024)
Category: Research Articles
Received: Apr. 1, 2024
Accepted: Jun. 13, 2024
Posted: Jun. 14, 2024
Published Online: Jul. 19, 2024
The Author Email: Kildishev Alexander V. (kildisha@purdue.edu)