The global chip industry is grappling with dual challenges: a profound shortage of new chips and a surge of counterfeit chips valued at $75 billion, introducing substantial risks of malfunction and unwanted surveillance. To counteract this, we propose an optical anti-counterfeiting detection method for semiconductor devices that is robust under adversarial tampering features, such as malicious package abrasions, compromised thermal treatment, and adversarial tearing. Our new deep-learning approach uses a RAPTOR (residual, attention-based processing of tampered optical response) discriminator, showing the capability of identifying adversarial tampering to an optical, physical unclonable function based on randomly patterned arrays of gold nanoparticles. Using semantic segmentation and labeled clustering, we efficiently extract the positions and radii of the gold nanoparticles in the random patterns from 1000 dark-field images in just 27 ms and verify the authenticity of each pattern using RAPTOR in 80 ms with 97.6% accuracy under difficult adversarial tampering conditions. We demonstrate that RAPTOR outperforms the state-of-the-art Hausdorff, Procrustes, and average Hausdorff distance metrics, achieving a 40.6%, 37.3%, and 6.4% total accuracy increase, respectively. |
1.IntroductionThe semiconductor industry has grown into a $500 billion global market over the last 60 years. However, the semiconductor fabrication pipeline has become fragmented, inadvertently giving rise to a $75 billion counterfeit chip market that jeopardizes safety and security across multiple sectors dependent on semiconductor technologies, such as aviation, communications, quantum, artificial intelligence, and personal finance.1–5 Several techniques aimed at affirming semiconductor authenticity have been introduced to detect counterfeit chips, largely leveraging physical security tags baked into the chip functionality or packaging.6–13 Central to many of these methods are physical unclonable functions (PUFs),14,15 which are unique physical systems that are difficult to replicate, either because of economic constraints or inherent physical properties. Rather than being grounded in cryptographic hardness, PUFs emphasize the economic and technological challenges of duplicating a given system’s physical characteristics.16 Optical PUFs, which capitalize on the distinct optical responses of random media, are especially promising. However, achieving scalability and maintaining accurate discrimination between adversarial tampering and natural degradation, such as physical aging at higher temperatures, packaging abrasions, and humidity, poses significant challenges.17–19 To combat these difficulties, this study focuses on an optical PUF model utilizing the distance matrix constructed of the positions and radii of random gold nanoparticles.20 The overview process of the PUF tamper detection method is demonstrated in Fig. 1. Due to the extreme difficulty of replicating large sets of nanoparticles with precise positions and radii, the distance matrix acts as the PUF signature. However, we demonstrate that current verification methods for distance matrix PUFs are neither sufficiently scalable nor robust enough for discriminating between natural disturbances and adversarial tampering. First, we take dark-field images of nanoparticles that are randomly distributed. The random positions and radii are extracted using semantic segmentation and labeled clustering. Then, the nanoparticles undergo treatment due to either natural degradation, e.g., minor thermal treatment and packaging abrasions, or adversarial tampering, e.g., substrate tearing, thermal tampering, and refilling. After the nanoparticles are exposed to either kind of treatment, the nanoparticle positions and radii are remeasured, and a new, posttampered distance matrix is compared against the pretampered distance matrices. Previous works use variations in the Hausdorff distance metric to classify pre- and posttampering detection. In addition to the Hausdorff metric, we also apply the Procrustes matrix distance and average-Hausdorff-distance metrics21–30 as analytical, classical methods for discrimination. However, under more difficult assumptions of adversarial tampering, both the Hausdorff and Procrustes metrics can be provably tampered with, as we show in Sec. 4. Addressing this gap, we present a novel deep-learning approach using residual, attention-based processing of tampered optical responses (RAPTOR),31–33 showing marked improvements in both speed and accuracy under diverse adversarial tampering conditions. Overall, the novelty of our approach is demonstrated as
We begin by discussing the importance of optical PUFs for semiconductor authentication and then spotlight the challenges in current verification methods. We then introduce a statistical approach to overcoming these challenges by formalizing the problem of adversarial tampering detection. We conclude by providing accuracy and speed results for both the average distance analysis and RAPTOR. 2.Background2.1.Physical Unclonable FunctionsPUFs are distinctive physical systems characterized by a unique, irreplicable, physical fingerprint. PUFs yield a probability distribution over random measurements of a system that is practically unclonable due to current technology, economic factors, or time constraints. That is, given two random physical systems, the probability of obtaining the same distribution of measurements is extremely low. An adversary will attempt to replicate the physical system that yields the measurement distribution in order to spoof any detection schemes. The detection of adversarial tampering features introduced during the spoofing process is based on the following steps: (1) PUF system preparation, (2) pretamper measurements, (3) random tampering, and (4) posttampering adversarial detection. Previous works primarily implement this detection method using optical PUFs, which construct unique scattering and/or spectral responses of random media.9,14 Optical PUFs are easy to fabricate and quick to measure, making them ideal for proof-of-concept experiments. Likewise, several other physical systems exhibit similar levels of randomness and measurability, including resonators,17 laser-induced speckle patterns,6 memristors,10 memtransistors,10 and intentional damaging in glass.34 However, nanoscale metallic optical systems, otherwise known as plasmonic PUFs, have been rising in popularity due to their strong scattering response at optical wavelengths, increasing robustness during posttampering measurements. Among the early instances of plasmonic PUFs are responses from dichroic gold barcodes,35 anisotropic gold nanoparticles grown within thin silicon dioxide films,36 distinct surface plasmon resonance modes,37 unique molecular configurations embedded in multilayer structures,18,38 and 100 nm gold nanorods.39 Nevertheless, while serving as viable PUF prototypes, these methods grapple with scalability challenges, either in fabrication or measurement robustness. To address these limitations, we reintroduce a streamlined, plasmonic PUF suitable for large-scale applications: the distance matrix verification of gold nanoparticles.20 As we argue in Appendix A (Sec. 6.4), gold nanoparticles are sufficiently random during fabrication and can easily be measured using dark-field microscopy, a readily available technique that can integrate seamlessly into any stage of the semiconductor fabrication pipeline. 2.2.Distance Matrix PUFsFigure 2 shows the distance matrix extraction process based on gold nanoparticle PUFs from dark-field images. The detailed segmentation process is found in Sec. 4.1 and Appendix A (Sec. 6.3). Distance matrix PUFs are given by the distance matrix constructed by all pairwise distances between nanoparticle positions. Let be the Euclidean distance between nanoparticles and , with positions and , respectively; then the distance matrix elements are defined as . The merit of the distance matrix as a PUF lies in its symmetry properties: it is rotationally and translationally invariant, renormalizable, and simple enough for computer-vision measurements across varying fields of view and orientations. It is important to note that the use of distance matrix PUFs makes an implicit assumption that the probability of introducing random translations and rotations during measurement is much higher than that of fabricating two systems that are identical under a rotation and translation symmetry. This ensures that in-plane distance matrices are uniquely associated with their system state, barring unlikely rotational and translational symmetries introduced during fabrication. This motivates our use of distance matrices as reliable PUFs as we now introduce their analysis. Smith et al.20 showed that the Hausdorff distance is robust in accounting for translations as well as illumination discrepancies in the imaging process. In this study, we expanded the tests with a wider range of adversarial tampering through simulation by increasing the translation and rotation of the imaging lens, increasing the noise perturbations of the nanoparticle positions, and introducing adversarial tearing and refilling, as described in detail in Sec. 3.2. 3.MethodsFigure 3 presents our machine-learning-assisted authentication flowchart from fabrication to tampering detection. Consider a physical system state generated by a fabrication process . A PUF gives a distribution over measurements of the system conditioned on the system state. After recording a set of measurements , the system state evolves to a new state via either an adversarial tampering process or natural degradation process , e.g., natural thermal changes, packaging abrasions. An independent Bernoulli variable chooses which of the two distributions produces the state evolution. The general tampering distribution is conditioned on the initial system state and the tampering indicator , i.e., and . Once the system has undergone the chosen tampering, we record the posttampering measurements in a new database . Using a discriminator function , with variational parameters , we infer the tampering indicator to determine whether the system underwent a natural degradation process or the adversarial tampering process. Our objective function for detecting adversarial tampering is optimized by finding the optimal variational parameters for our discriminator function , as where is the marginal distribution of the posttampering measurements , given the initial system state and tampering indicator , which are baked into the expectation implicitly. We now apply this definition to distance matrix PUFs.3.1.Nanoparticles for the PUF-D ProblemThe gold nanoparticles are uniformly distributed on the substrate , but their radii are normally distributed , which yield a system state . Then, a database of randomly positioned dark-field images is created through dark-field microscopy. Due to the extremely large number of samples taken during dark-field microscopy, the measurement density is highly correlated to the fabrication prior through a narrow Gaussian peak (Assuming dark-field microscopy is i.i.d. sampling, then the law of large numbers dictates the measurement will converge as where is the number of measurements taken by the dark-field microscope on a single nanoparticle with variance .) and is approximately localized , where is our approximation to the true system state . Therefore, the problem objective in Eq. (1) can be approximated as by marginalizing out and from the inner expectations using the delta function. Taking the distance matrices of the inferred system state and the evolved system state yields a distance matrix objective function, where is now defined on the distance matrix space. (As mentioned previously, we assume here that the probability of introducing random translations and rotations during imaging is far less likely than that of producing the same distance matrix for two sets of nanoparticles.) This becomes our objective function for constructing RAPTOR. Now, we explicitly consider features of the tampering distribution .3.2.Adversarial TamperingDuring the random tampering step, the system may undergo either natural changes given by or adversarial tampering given by . Thermal fluctuations may occur for both treatments, and they introduce varying degrees of random Gaussian translations of the nanoparticles, i.e., . However, adversarial tampering introduces Gaussian translations as well as substrate tearing and refilling, as shown in Fig. 4. Adversarial tearing introduces a random cut through the plane, displacing each nanoparticle location by a magnitude of , orthogonal to a cut vector weighted by a tearing coefficient . As demonstrated in Fig. 4(c), introducing tears alters the average distance, thereby making adversarial tearing detectable by statistical discrimination. In the less ideal case, an adversary will attempt to refill the tear by introducing nanoparticles of a similar density as the fabrication density to recover similar features to the natural degradation. As shown in Fig. 4, filling the tear makes the average nanoparticle distance indistinguishable from natural degradation noise, with some constant distance. Therefore, a purely expected distance discrimination method between the tampering distributions and is completely unfeasible for small sample sizes under adversarial filling. Therefore, discrimination tasks necessitate conditioning on the measurements and . 3.3.Distance Matrix AuthenticationThree analytical distance metrics are explored for distance matrix authentication: Hausdorff distance, Procrustes distance, and the average Hausdorff distance (AHD). For each of these metrics, the binary classification threshold is determined via logistic regression. If the distance between two matrices is above the logistic threshold, the posttamper matrix is considered too dissimilar to arise from the environment or natural degradation. Otherwise, the matrix is considered to have an acceptable level of natural changes and is therefore authentic. 3.3.1.Hausdorff metricThe Hausdorff distance metric is the maximum Euclidean distance between each point and its nearest neighbor as shown in Eq. (4). (Using the distance matrix elements and instead of and does not yield significant differences in results for our purposes.) 3.3.2.Procrustes metricAn alignment matrix is a matrix that aligns two sets of multivariate data by transforming one into the other. Procrustes analysis is a statistical method that finds the optimal alignment matrix that minimizes the sum of squared distances between corresponding points in and , thus accounting for rotational, translational, and scaling discrepancies.40 Procrustes distance is then given by the sum, Ordering and data set size constraints make Procrustes a less reliable method for distance matrix matching. Likewise, finding the optimal alignment matrix is an iterative and time-consuming process compared to Hausdorff. 3.3.3.Average Hausdorff distance metricAn average-nearest-neighbor approach offers a more robust solution in practice than the Hausdorff and Procrustes metrics. Rather than simply considering the maximum nearest neighbor, it considers all nearest neighbors and is thus less sensitive to slight changes in any single nanoparticle position.21 The AHD is defined as Despite the previously reported 100% accuracy of distance matrix verification schemes involving a Hausdorff-inspired metric similar to AHD,20 we demonstrate in Sec. 4.2 that under more difficult adversarial tampering conditions, AHD eclipses both Hausdorff and Procrustes metrics, but is still beaten by RAPTOR. 3.4.RAPTORRAPTOR (Fig. 5) takes a more supervised approach to compute the authenticity of a distance matrix. For each nanoparticle , we reweight the posttamper matrix by a soft-weight matrix to indicate the probability that nanoparticle in the pretamper matrix is nanoparticle in the posttamper matrix [Fig. 5(a)]. Let be the query row tensor; then for each nanoparticle , we compute the soft-weight where is a variational parameter. Then, we multiply each row of the value matrix by the soft-weight , thereby creating a unique attention distance matrix for each nanoparticle , i.e., This mechanism zeroes out rows in the posttamper matrix , whose nanoparticles are unlikely to be the same before and after tampering based on the difference in radii. Then, using the pretamper distance matrix , we compute the probability that nanoparticle is the same as nanoparticle , defining the matrix elements , by first encoding all pairwise rows between both matrices using a 3D ResNet encoder model to compute the element in Fig. 5(b). The feature matrix along with , , , and are concatenated along the channel dimension and fed into the residual attention-based classifier shown in Fig. 5(c). An algorithmic description of RAPTOR is included in Appendix B (Sec. 7.1). 4.Results and Discussion4.1.Semantic SegmentationTo reliably extract the nanoparticle centers and radii, we employ semantic segmentation networks to separate the image into two classes: nanoparticle and dark-field background. First, we trained the unsupervised semantic segmentation network STEGO as ground-truth labels for a data set of 10,000 dark-field images.41 We chose STEGO due to its prominence in the literature in assigning meaningful and high-quality segmentation to unlabeled data. The training data set for STEGO is created by randomly selecting and positioning gold nanoparticles obtained from a data set of 2400 gold nanoparticles extracted from 40 dark-field images. Particle extraction is performed via brightness thresholding at 4% intensity, followed by regional clustering and is manually verified for each input image. A minimum pattern radius of is enforced to discern the particles from noise. From this data set, samples of transformed particles are generated to match the source distributions of on average 79 particles per image () and source dimensions ( at ), thus creating an augmented data set that is visually indistinguishable from source images. We injected 4% intensity Gaussian noise to match realistic noise levels from the dark-field images data set. The particle density is uniform across samples as discussed in Appendix A (Sec. 6.4). We list detailed explanations for choosing the parameter values mentioned in Appendix A (Sec. 6.5). STEGO is very powerful but slow for simple semantic segmentation. Hence, we train both a lightweight ResNet-based attention convolutional neural network and a Gaussian blurring filter for mimicking STEGO. Overall, as demonstrated in Table 1, our CNN model and Gaussian filters achieve binary cross-entropy losses of and 0.56 and compute 1000 images in 27 and 33 ms on a T4 GPU, as opposed to 24 min for 1000 images using STEGO. After computing the semantic segmentation labels, all images are fed into a labeled clustering algorithm that extracts the center of mass and radii of 1000 images in 250 ms. Table 1Overall performance comparison of each method for distance matrix extraction and discrimination tasks. For all results in the table, a 1000-sample tensor was loaded onto an NVIDIA T4 GPU (except Procrustes, which used all CPU RAM) and batched at maximum capacity for the particular model. Accuracy is measured by the number of correct pixels or authentication classifications over the total. For semantic segmentation, we include the BCE loss to show a marginal advantage in using ResNet over Gaussian blur. The computation time is measured by preloading all data onto an NVIDIA T4 GPU or CPU RAM before recording the start time.
4.2.Tampering DiscriminationThe tampering data set is generated synthetically at run-time offline from semantic segmentation. A substrate of size is filled uniformly with a nanoparticle density of 100 per unit square, and the radii are normally sampled i.i.d. . Natural degradation is introduced through a simple displacement of nanoparticles by a factor using the r.v. . For adversarial tampering, a tampering configuration is chosen at random using the following scheme. For adversarial displacement noise, we multiply the noise r.v. by a random coefficient, i.e., , where is chosen uniformly. The tear coefficient is also chosen uniformly. Tampering data are generated under harsher conditions than the expected imaging conditions to show robustness. Note that the tampered data are produced in the same manner as training data, with an additional tampering step. Finally, to test the imaging robustness, we randomly decide to rotate all nanoparticles about the center by a uniformly chosen angle. We also apply a constant translation in a randomly uniform direction with translation coefficients in . After applying the randomly chosen tampering configuration, all nanoparticles within the center unit square are sorted in descending order of radii, and their associated distance matrix and radii are extracted for authentication. RAPTOR is trained to discriminate tampering under eight different noise levels, causing random particle movements of up to 10% image width from a pessimistic 5% natural degradation level. The adversarial filling is performed under worst-scenario conditions in which filling precisely matches perforation boundaries while matching initial particle density. RAPTOR is trained in batches of 100 images, on information from the 56 largest radii particle patterns in each image, with a learning rate of 0.01. During training, RAPTOR is compared to analytical methods: Hausdorff, Procrustes, and AHD. For all analytical methods, the output distance metric is fit to a logistic regression model for determining authenticity. Table 1 shows the average accuracy and computation times of RAPTOR alongside the analytical methods. RAPTOR has the highest average accuracy, correctly detecting tampering in 97.6% of distance matrices under worst-case-scenario tampering assumptions and exceeding the performance of the Hausdorff, Procrustes, and AHD methods by 40.6%, 37.3%, and 6.4%, respectively. The AHD has the fastest computation time in discrimination tasks and the highest accuracy among the three analytical methods. 5.ConclusionIn this work, we demonstrate the robustness of a new RAPTOR for the authentication of semiconductor devices, using random pattern arrays of gold nanoparticles as distance-matrix-based optical PUFs. The arrays are imaged using dark-field microscopy, and the positions and radii of individual particle patterns are extracted using semantic segmentation and labeled clustering. We introduce difficult, yet realistic, adversarial tampering features through tearing and substrate refilling, or natural deviations through thermal noise with varying levels of substrate heating. We demonstrate that RAPTOR achieves a tampering accuracy of 97.6%, greatly outperforming the Hausdorff, Procrustes, and AHD distance metrics by 40.6%, 37.3%, and 6.4%, respectively. These results indicate that RAPTOR significantly outperforms known classical distance matrix metric methods for authenticating PUFs built on the random arrays of gold nanoparticles in accuracy and speed. The ease of fabrication of gold nanoparticles, along with rapid and robust tampering detection with RAPTOR, opens up a large opportunity for the adoption of machine-learning-based tampering detection schemes in the semiconductor industry. However, more work is required in material development to ensure that these methods are robust to unforeseen types of tampering and natural degradation. Furthermore, hyperparameter optimization and alternative deep networks may improve the speed or accuracy of RAPTOR. While our scheme greatly improves on the core bottlenecks found in these verification schemes, future work could consider the computation of the distance matrices directly without labeled clustering, or a full end-to-end network that does not use semantic segmentation as an intermediate step in the verification process. 6.Appendix A: PUFs and Data Set6.1.Nanoparticle PUFs FabricationA diluted nanoparticle suspension () of 75 nm Au () (nanoComposix, Inc.) in deionized (DI) nanopure water (2 mL) is drop cast onto the precleaned silicon substrate, which is prepared by standard solvent cleaning [placed substrate within toluene, acetone, and iso-propyl alcohol (IPA) in three separate steps, with 5 min sonication at each step] and piranha cleaning [placed substrate in 3:1 volume ratio concentrated sulfuric acid () and hydrogen peroxide () for 15 min] in a controlled cleanroom environment. Then, the sample is placed horizontally to let the liquid evaporate naturally to leave the gold nanoparticle pattern on the substrate. 6.2.Optical ImagingThe dark-field optical imaging system consists of a Keyence VHX-6000 digital microscope with a high-brightness LED light source, a 1/1.8-in. CMOS image sensor with virtual pixels 1600 () × 1200 () maximum, a ZS-200 RZ×200-×2000 objective lens with a fine adjustment for working distance, and a color LCD monitor with 16,770,000 colors and a 1000:1 contrast ratio. The dark-field images are taken at 1500× magnification to form the training data set for semantic segmentation and verify the uniformity of the formed PUFs prior. 6.3.Synthetic Dark-Field Image Dataset Generation and SegmentationWe built a data set of 10,000 images by augmenting 40 dark-field images. Over 2400 nanoparticle bounding boxes are extracted from 40 source images via connectivity-based clustering of thresholded image segments. Augmented images are generated by randomly placing nanoparticles from the set of bounding boxes in uniformly distributed positions. To ensure maximal variability in the augmented data set, we apply random rotation, shear, and additive noise transformations to each particle before placement. Due to the resolution of the dark-field microscope, we only consider nanoparticle scattering patterns with radii greater than , as any smaller patterns cannot be verified to be gold nanoparticles. Gaussian noise is injected into the background to further mimic the original images, effectively reintroducing nanoparticles with average radii less than to the augmented data set. A ResNet-based convolutional neural network and a Gaussian filter are demonstrated to accurately segment 1000 dark-field images in only 27 and 33 ms, respectively. Each of these methods achieves 99% segmentation accuracy, greatly outperforming the classical methods and the ground truth unsupervised segmentation network STEGO in speed with negligible error in accuracy. (It takes 24 min for STEGO to segment 1000 images.) These segmented images are postprocessed for reliable position and radii extraction using labeled clustering. 6.4.Uniformity of PUFsFor a normalized uniform distribution, the expected distance between any two points is given exactly by42 . To test the uniformity of the nanoparticle placements, we took 40 dark-field images of randomly embedded nanoparticles on the substrate and measured the expected distance between any two nanoparticles to be 0.521318, which has an error of 0.017%. 6.5.Parameters ChoicesOur study provides a research-oriented example to demonstrate a comprehensive feasibility study. Forming an optimal or adaptive threshold for the following parameters may require additional study with auxiliary training and analysis, especially for industry-level systems.
7.Appendix B: Authentication Methods7.1.RAPTOR Algorithmic OverviewInputs:
RAPTOR:
Outputs: 7.2.Analytical MethodsWe introduce statistical authentication methods using Hausdorff, Procrustes, and AHD metrics and benchmark their performance in authenticating distance matrices extracted from dark-field images. All learning is performed in the same Jupyter environment on an NVIDIA T4 GPU with 16 GB of GPU RAM and an Intel(R) Xeon(R) CPU running at 2.30 GHz with 12.7 GB of system RAM. Each discrimination model is trained for 5000 epochs with a mini-batch of 100 random graph instances with random tampering, as discussed in Sec. 4.2. Training graphs are randomly generated at training time to prevent overfitting. Our validation step measures the average accuracy across the most recent 500 epochs. Reported accuracy is the maximum accuracy achieved by each discrimination method during the validation step. 7.3.Alternative Deep-Learning NetworksIn an attempt to compare against other deep-learning methods, we used the same data fed into RAPTOR with different networks. We tried deep feed-forward multilayer perceptron networks, Siamese graph encoder networks, and deep residual convolutional layers. However, these were not able to consistently outperform the AHD, achieving accuracies below 70%. We also attempted to use the AHD metric as a resource for these networks, but these networks relied too heavily on the metric and converged to the same performance with minimal improvements below RAPTOR. Code and Data AvailabilityThe codes that support the findings of this article are not publicly available due to ongoing IP protection and licensing. The initial training data sets can be requested from the author at wilso692@purdue.edu. AcknowledgmentsThis work was supported in part by the U.S. Department of Energy (DOE) Office of Science, through the Quantum Science Center (QSC), the National Quantum Information Science Research Center (algorithm development), the National Science Foundation (NSF), and Purdue’s Elmore ECE Emerging Frontiers Center “The Crossroads of Quantum and AI.” ReferencesK. S. Kumar et al.,
“Secure split test techniques to prevent IC piracy for IoT devices,”
Integration, 58 390
–400 https://doi.org/10.1016/j.vlsi.2016.09.004 IVJODL 0167-9260
(2017).
Google Scholar
“Counterfeit chips a problem as global shortage increases semiconductor fraud,”
https://www.asminternational.org/news/industry/-/journal_content/56/10180/49218564/NEWS/
(2024).
Google Scholar
P. Karazuba,
“Combating counterfeit chips,”
https://semiengineering.com/combating-counterfeit-chips/
(2024).
Google Scholar
U. Guin et al.,
“Counterfeit integrated circuits: a rising threat in the global semiconductor supply chain,”
Proc. IEEE, 102
(8), 1207
–1228 https://doi.org/10.1109/JPROC.2014.2332291 IEEPAD 0018-9219
(2014).
Google Scholar
B. Wilson et al.,
“Empowering quantum 2.0 devices and approaches with machine learning,”
in Quantum 2.0 Conf. and Exhibit.,
QTu2A.13
(2022). Google Scholar
K. Kim et al.,
“Massively parallel ultrafast random bit generation with a chip-scale laser,”
Science, 371
(6532), 948
–952 https://doi.org/10.1126/science.abc2666 SCIEAS 0036-8075
(2021).
Google Scholar
Y. Yao et al.,
“Clockpuf: physical unclonable functions based on clock networks,”
in Design, Autom. & Test in Eur. Conf. & Exhibit. 2013,
422
–427
(2013). Google Scholar
M. Song et al.,
“Colors with plasmonic nanostructures: a full-spectrum review,”
Appl. Phys. Rev., 6 041308 https://doi.org/10.1063/1.5110051
(2019).
Google Scholar
M. Song et al.,
“Enabling optical steganography, data storage, and encryption with plasmonic colors,”
Laser Photonics Rev., 15 2000343 https://doi.org/10.1002/lpor.202000343
(2021).
Google Scholar
B. Liu et al.,
“Memristive true random number generator with intrinsic two-dimensional physical unclonable function,”
ACS Appl. Electron. Mater., 5
(2), 714
–720 https://doi.org/10.1021/acsaelm.2c01533
(2023).
Google Scholar
A. Oberoi et al.,
“Secure electronics enabled by atomically thin and photosensitive two-dimensional memtransistors,”
ACS Nano, 15
(12), 19815
–19827 https://doi.org/10.1021/acsnano.1c07292 ANCAC3 1936-0851
(2021).
Google Scholar
P. Ebenezer,
“Counterfeit mitigation with PUF-embedded readout,”
in Govt. Microelectron. Appl. and Crit. Technol. Conf.,
(2020). Google Scholar
U. Rührmair, S. Devadas and F. Koushanfar, Introduction to Hardware Security and Trust, Springer Science Business Media(
(2012). Google Scholar
R. Pappu et al.,
“Physical one-way functions,”
Science, 297
(5589), 2026
–2030 https://doi.org/10.1126/science.1074376 SCIEAS 0036-8075
(2002).
Google Scholar
B. Gassend et al.,
“Silicon physical random functions,”
in Proc. 9th ACM Conf. Comput. and Commun. Secur.,
148
–160
(2002). Google Scholar
R. Maes, Physically Unclonable Functions, 49
–80 Springer Berlin, Heidelberg
(2013). Google Scholar
J. Knechtel et al.,
“Toward physically unclonable functions from plasmonics-enhanced silicon disc resonators,”
J. Lightwave Technol., 37
(15), 3805
–3814 https://doi.org/10.1109/JLT.2019.2920949 JLTEDG 0733-8724
(2019).
Google Scholar
Y. Cui et al.,
“Multiplex plasmonic anti-counterfeiting security labels based on surface-enhanced Raman scattering,”
Chem. Commun., 51
(25), 5363
–5366 https://doi.org/10.1039/C4CC08596E
(2015).
Google Scholar
L. P. de Souza et al.,
“Influence of annealing temperature and SN doping on the optical properties of hematite thin films determined by spectroscopic ellipsometry,”
J. Appl. Phys., 119 245104 https://doi.org/10.1063/1.4954315 JAPIAU 0021-8979
(2016).
Google Scholar
A. F. Smith, P. Patton and S. E. Skrabalak,
“Plasmonic nanoparticles as a physically unclonable function for responsive anti-counterfeit nanofingerprints,”
Adv. Funct. Mater., 26
(9), 1315
–1321 https://doi.org/10.1002/adfm.201503989 AFMDC6 1616-301X
(2016).
Google Scholar
O. U. Aydin et al.,
“On the usage of average Hausdorff distance for segmentation performance assessment: hidden error when used for ranking,”
Eur. Radiol. Exp., 5
(1), 4 https://doi.org/10.1186/s41747-020-00200-2
(2021).
Google Scholar
E. A. AlBadawy, A. Saha and M. A. Mazurowski,
“Deep learning for segmentation of brain tumors: impact of cross-institutional training and testing,”
Med. Phys., 45
(3), 1150
–1158 https://doi.org/10.1002/mp.12752 MPHYA6 0094-2405
(2018).
Google Scholar
M. Livne et al.,
“A U-Net deep learning framework for high performance vessel segmentation in patients with cerebrovascular disease,”
Front. Neurosci., 13 97 https://doi.org/10.3389/fnins.2019.00097 1662-453X
(2019).
Google Scholar
A. Hilbert et al.,
“Brave-Net: fully automated arterial brain vessel segmentation in patients with cerebrovascular disease,”
Front. Artif. Intell., 3 552258 https://doi.org/10.3389/frai.2020.552258
(2020).
Google Scholar
K. A. Powell et al.,
“Atlas-based segmentation of temporal bone anatomy,”
Int. J. Comput. Assist. Radiol. Surg., 12
(11), 1937
–1944 https://doi.org/10.1007/s11548-017-1658-6
(2017).
Google Scholar
J. Guenette et al.,
“MR imaging of the extracranial facial nerve with the CISS sequence,”
Am. J. Neuroradiol., 40
(11), 1954
–1959
(2019).
Google Scholar
B. Peltenburg et al.,
“PO-0899: tumor volume delineation using non-EPI diffusion weighted MRI and FDG-pet in head-and-neck patients,”
Radiother. Oncol., 123 S496
–S497 https://doi.org/10.1016/S0167-8140(17)31336-1 RAONDT 0167-8140
(2017).
Google Scholar
F. Rizzetto et al.,
“Impact of inter-reader contouring variability on textural radiomics of colorectal liver metastases,”
Eur. Radiol. Exp., 4
(1), 62 https://doi.org/10.1186/s41747-020-00189-8
(2020).
Google Scholar
M. R. Liechti et al.,
“Manual prostate cancer segmentation in MRI: interreader agreement and volumetric correlation with transperineal template core needle biopsy,”
Eur. Radiol., 30
(9), 4806
–4815 https://doi.org/10.1007/s00330-020-06786-w
(2020).
Google Scholar
C. Chen et al.,
“Tracking pylorus in ultrasonic image sequences with edge-based optical flow,”
IEEE Trans. Med. Imaging, 31
(3), 843
–855 https://doi.org/10.1109/TMI.2012.2183884 ITMID4 0278-0062
(2012).
Google Scholar
A. Vaswani et al.,
“Attention is all you need,”
in Adv. Neural Inf. Process. Syst. 30,
(2017). Google Scholar
I. Malkiel et al.,
“Plasmonic nanostructure design and characterization via deep learning,”
Light Sci. Appl., 7 60 https://doi.org/10.1038/s41377-018-0060-7
(2018).
Google Scholar
L. Mascaretti et al.,
“Designing metasurfaces for efficient solar energy conversion,”
ACS Photonics, 10
(12), 4079
–4103 https://doi.org/10.1021/acsphotonics.3c01013
(2023).
Google Scholar
A. P. Vladimirov et al.,
“Assessing fatigue damage in organic glass using optical methods,”
Opt. Spectrosc., 127 943
–953 https://doi.org/10.1134/S0030400X19110286 OPSUA3 0030-400X
(2019).
Google Scholar
L. Gonzalez-García et al.,
“Tuning dichroic plasmon resonance modes of gold nanoparticles in optical thin films,”
Adv. Funct. Mater., 23 1655
–1663 https://doi.org/10.1002/adfm.201201900 AFMDC6 1616-301X
(2012).
Google Scholar
M. M. Hawkeye and M. J. Brett,
“Glancing angle deposition: fabrication, properties, and applications of micro- and nanostructured thin films,”
J. Vac. Sci. Technol. A, 25
(5), 1317
–1335 https://doi.org/10.1116/1.2764082 JVTAD6 0734-2101
(2007).
Google Scholar
E. Hutter and J. H. Fendler,
“Exploitation of localized surface plasmon resonance,”
Adv. Mater., 16 1685
–1706 https://doi.org/10.1002/adma.200400271 ADVMEW 0935-9648
(2004).
Google Scholar
J. Langer et al.,
“Present and future of surface-enhanced Raman scattering,”
ACS Nano, 14
(1), 28
–117 https://doi.org/10.1021/acsnano.9b04224 ANCAC3 1936-0851
(2020).
Google Scholar
C. Kuemin et al.,
“Oriented assembly of gold nanorods on the single-particle level,”
Adv. Funct. Mater., 22 702
–708 https://doi.org/10.1002/adfm.201101760 AFMDC6 1616-301X
(2011).
Google Scholar
C. Goodall,
“Procrustes methods in the statistical analysis of shape,”
J. R. Stat. Soc.: Ser. B (Methodol.), 53 285
–321 https://doi.org/10.1111/j.2517-6161.1991.tb01825.x
(1991).
Google Scholar
M. Hamilton et al.,
“Unsupervised semantic segmentation by distilling feature correspondences,”
in Int. Conf. Learn. Represent.,
(2022). Google Scholar
B. Burgstaller and F. Pillichshammer,
“The average distance between two points,”
Bull. Am. Math. Soc., 80
(3), 353
–359 https://doi.org/10.1017/S0004972709000707 BAMOAD 0273-0979
(2009).
Google Scholar
R. Pathria and P. D. Beale, Statistical Mechanics, Elsevier Ltd.(
(2011). Google Scholar
BiographyBlake A. Wilson earned his PhD at Purdue University in Electrical and Computer Engineering. He now works as a Research Scientist at Quantinuum, UK, working on generative AI, categorical machine learning and quantum algorithms. Yuheng Chen is a third-year PhD student at the Elmore Family School of Electrical and Computer Engineering, Purdue University. His research focuses on the meeting point of AI, physics, and nanodevices, including AI-driven inverse design in photonic/quantum devices, generative machine learning model application exploration, and photonic/quantum devices electromagnetic simulation. Daksh Kumar Singh is an undergraduate research assistant pursuing an integrated bachelors and masters in electrical and computer engineering at Purdue University. Currently focused on enhancing nanofabrication, characterization, and data analysis techniques through quantum algorithms and machine learning. Rohan Ojha is an undergraduate electrical engineering student at Purdue University, specializing in microelectronics/semiconductors and quantum technology. At Purdue’s Quantum Science and Engineering Institute, he researches machine learning applications in photonics. He interned at Sandia National Laboratories working in quantum error correction. He plans to pursue a PhD in quantum technology. Michael Bezick is a rising junior undergraduate research assistant in computer science at Purdue University, with a passion for machine learning. He focuses on applications of generative models, such as variational autoencoders and diffusion models, to nanophotonic optimization problems. He plans to pursue a PhD in machine learning to contribute to the advancement of the field and further apply himself in industry post-graduation. Alexandra Boltasseva received her PhD from the Technical University of Denmark and is currently the Ron and Dotty Garvin Tonjes Distinguished Professor of Electrical and Computer Engineering at Purdue University where she specializes in nanophotonics, optical metamaterials, and quantum photonics. As Purdue’s Discovery Park fellow, she leads the university-wide multidisciplinary Big Idea Challenge program in quantum information science and technology/security/health. She was editor-in-chief of the Optical Society of America’s Optical Materials Express journal. Vladimir M. Shalaev, scientific director for nanophotonics at Birck Nanotechnology Center and distinguished professor of electrical and computer engineering at Purdue University, specializes in nanophotonics, plasmonics, optical metamaterials, and quantum photonics. He has received numerous awards, including APS Frank Isakson Prize, Max Born Award, etc. He is recognized as a highly cited researcher in physics by the Web of Science 2017–2023. He is a fellow of the IEEE, APS, SPIE, MRS, and Optica. Alexander V. Kildishev is renowned for his groundbreaking work in optical metamaterials and transformation optics that spans theoretical concepts, advanced numerical modeling, and experimental guidance. His research has enabled superlenses, hyperlenses, and optical black holes. His recent work focuses on advanced multiphysics modeling in nonlinear optics and AI-driven inverse design in photonics. Beyond other awards, was listed as a highly cited researcher by the Web of Science in 2018, 2022, and 2023. |