{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T01:42:40Z","timestamp":1762047760923,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":59,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030987947"},{"type":"electronic","value":"9783030987954"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-98795-4_14","type":"book-chapter","created":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T18:03:58Z","timestamp":1649354638000},"page":"335-359","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["On Implementation-Level Security of\u00a0Edge-Based Machine Learning Models"],"prefix":"10.1007","author":[{"given":"Lejla","family":"Batina","sequence":"first","affiliation":[]},{"given":"Shivam","family":"Bhasin","sequence":"additional","affiliation":[]},{"given":"Jakub","family":"Breier","sequence":"additional","affiliation":[]},{"given":"Xiaolu","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Dirmanto","family":"Jap","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,8]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Agoyan, M., Dutertre, J.M., Mirbaha, A.P., Naccache, D., Ribotta, A.L., Tria, A.: How to flip a bit? In: On-Line Testing Symposium (IOLTS), 2010 IEEE 16th International, pp. 235\u2013239. IEEE (2010)","DOI":"10.1109\/IOLTS.2010.5560194"},{"key":"14_CR2","unstructured":"Alam, M., Bag, A., Roy, D.B., Jap, D., Breier, J., Bhasin, S., Mukhopadhyay, D.: Enhancing fault tolerance of neural networks for security-critical applications. arXiv preprint arXiv:1902.04560 (2019)"},{"key":"14_CR3","doi-asserted-by":"publisher","unstructured":"Alam, M., Mukhopadhyay, D.: How secure are deep learning algorithms from side-channel based reverse engineering? In: Proceedings of the 56th Annual Design Automation Conference 2019, DAC 2019, Las Vegas, NV, USA, 02\u201306 June 2019, p. 226. ACM (2019). https:\/\/doi.org\/10.1145\/3316781.3322465","DOI":"10.1145\/3316781.3322465"},{"key":"14_CR4","unstructured":"Batina, L., Bhasin, S., Jap, D., Picek, S.: CSI NN: reverse engineering of neural network architectures through electromagnetic side channel. In: Heninger, N., Traynor, P. (eds.) 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, 14\u201316 August 2019, pp. 515\u2013532. USENIX Association (2019). https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/batina"},{"key":"14_CR5","doi-asserted-by":"publisher","unstructured":"Batina, L., Bhasin, S., Jap, D., Picek, S.: Poster: recovering the input of neural networks via single shot side-channel attacks. In: Cavallaro, L., Kinder, J., Wang, X., Katz, J. (eds.) Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, 11\u201315 November 2019, pp. 2657\u20132659. ACM (2019). https:\/\/doi.org\/10.1145\/3319535.3363280","DOI":"10.1145\/3319535.3363280"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Breier, J., Hou, X., Jap, D., Ma, L., Bhasin, S., Liu, Y.: Practical fault attack on deep neural networks. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 2204\u20132206 (2018)","DOI":"10.1145\/3243734.3278519"},{"issue":"3","key":"14_CR7","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1109\/TDSC.2019.2897663","volume":"18","author":"J Breier","year":"2019","unstructured":"Breier, J., Hou, X., Liu, Y.: On evaluating fault resilient encoding schemes in software. IEEE Trans. Dependable Secur. Comput. 18(3), 1065\u20131079 (2019)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Breier, J., Jap, D., Chen, C.N.: Laser profiling for the back-side fault attacks: with a practical laser skip instruction attack on AES. In: Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, pp. 99\u2013103. ACM (2015)","DOI":"10.1145\/2732198.2732206"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Breier, J., Jap, D., Hou, X., Bhasin, S., Liu, Y.: Sniff: reverse engineering of neural networks with fault attacks. arXiv preprint arXiv:2002.11021 (2020)","DOI":"10.1109\/TR.2021.3105697"},{"issue":"12","key":"14_CR10","doi-asserted-by":"publisher","first-page":"3322","DOI":"10.1109\/TCSII.2020.2989184","volume":"67","author":"J Breier","year":"2020","unstructured":"Breier, J., Khairallah, M., Hou, X., Liu, Y.: A countermeasure against statistical ineffective fault analysis. IEEE Trans. Circuits Syst. II Express Briefs 67(12), 3322\u20133326 (2020)","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"key":"14_CR11","doi-asserted-by":"publisher","unstructured":"Cao, X., Gong, N.Z.: Mitigating evasion attacks to deep neural networks via region-based classification. In: Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, 4\u20138 December 2017, pp. 278\u2013287. ACM (2017). https:\/\/doi.org\/10.1145\/3134600.3134606","DOI":"10.1145\/3134600.3134606"},{"key":"14_CR12","unstructured":"Chakraborty, A., Alam, M., Dey, V., Chattopadhyay, A., Mukhopadhyay, D.: Adversarial attacks and defences: a survey. arXiv preprint arXiv:1810.00069 (2018)"},{"key":"14_CR13","unstructured":"Ciresan, D.C., Meier, U., Masci, J., Gambardella, L.M., Schmidhuber, J.: Flexible, high performance convolutional neural networks for image classification. In: Twenty-Second International Joint Conference on Artificial Intelligence (2011)"},{"key":"14_CR14","unstructured":"Dennis, D.K., et al.: Edgeml: machine learning for resource-constrained edge devices (2020). https:\/\/github.com\/Microsoft\/EdgeML"},{"key":"14_CR15","doi-asserted-by":"publisher","unstructured":"Dong, G., Wang, P., Chen, P., Gu, R., Hu, H.: Floating-point multiplication timing attack on deep neural network. In: 2019 IEEE International Conference on Smart Internet of Things (SmartIoT), Tianjin, China, 9\u201311 August 2019, pp. 155\u2013161. IEEE (2019). https:\/\/doi.org\/10.1109\/SmartIoT.2019.00032","DOI":"10.1109\/SmartIoT.2019.00032"},{"key":"14_CR16","unstructured":"Dubey, A., Cammarota, R., Aysu, A.: Maskednet: a pathway for secure inference against power side-channel attacks. CoRR abs\/1910.13063 (2019). http:\/\/arxiv.org\/abs\/1910.13063"},{"key":"14_CR17","unstructured":"Duddu, V., Samanta, D., Rao, D.V., Balas, V.E.: Stealing neural networks via timing side channels. CoRR abs\/1812.11720 (2018). http:\/\/arxiv.org\/abs\/1812.11720"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1322\u20131333 (2015)","DOI":"10.1145\/2810103.2813677"},{"key":"14_CR19","unstructured":"Gilad-Bachrach, R., Dowlin, N., Laine, K., Lauter, K.E., Naehrig, M., Wernsing, J.: Cryptonets: applying neural networks to encrypted data with high throughput and accuracy. In: Balcan, M., Weinberger, K.Q. (eds.) Proceedings of the 33nd International Conference on Machine Learning, ICML 2016, New York City, NY, USA, 19\u201324 June 2016. JMLR Workshop and Conference Proceedings, vol. 48, pp. 201\u2013210. JMLR.org (2016). http:\/\/proceedings.mlr.press\/v48\/gilad-bachrach16.html"},{"key":"14_CR20","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv:1412.6572 (2014)"},{"key":"14_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-319-64647-3_13","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"OM Guillen","year":"2017","unstructured":"Guillen, O.M., Gruber, M., De Santis, F.: Low-cost setup for localized semi-invasive optical fault injection attacks. In: Guilley, S. (ed.) COSADE 2017. LNCS, vol. 10348, pp. 207\u2013222. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-64647-3_13"},{"key":"14_CR22","doi-asserted-by":"publisher","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, 27\u201330 June 2016, pp. 770\u2013778. IEEE Computer Society (2016). https:\/\/doi.org\/10.1109\/CVPR.2016.90","DOI":"10.1109\/CVPR.2016.90"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"He, W., Breier, J., Bhasin, S., Miura, N., Nagata, M.: An FPGA-compatible PLL-based sensor against fault injection attack. In: 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 39\u201340. IEEE (2017)","DOI":"10.1109\/ASPDAC.2017.7858291"},{"key":"14_CR24","unstructured":"Hong, S., et al.: Security analysis of deep neural networks operating in the presence of cache side-channel attacks. CoRR abs\/1810.03487 (2018). http:\/\/arxiv.org\/abs\/1810.03487"},{"key":"14_CR25","unstructured":"Hong, S., Frigo, P., Kaya, Y., Giuffrida, C., Dumitra, T.: Terminal brain damage: exposing the graceless degradation in deep neural networks under hardware fault attacks. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 497\u2013514 (2019)"},{"key":"14_CR26","unstructured":"Hu, X., et al.: Neural network model extraction attacks in edge devices by hearing architectural hints. CoRR abs\/1903.03916 (2019). http:\/\/arxiv.org\/abs\/1903.03916"},{"key":"14_CR27","doi-asserted-by":"publisher","unstructured":"Hua, W., Zhang, Z., Suh, G.E.: Reverse engineering convolutional neural networks through side-channel information leaks. In: Proceedings of the 55th Annual Design Automation Conference, DAC 2018, San Francisco, CA, USA, 24\u201329 June 2018, pp. 4:1\u20134:6. ACM (2018). https:\/\/doi.org\/10.1145\/3195970.3196105","DOI":"10.1145\/3195970.3196105"},{"key":"14_CR28","unstructured":"Iandola, F.N., Han, S., Moskewicz, M.W., Ashraf, K., Dally, W.J., Keutzer, K.: Squeezenet: Alexnet-level accuracy with 50x fewer parameters and $${<}$$0.5mb model size. arXiv:1602.07360 (2016)"},{"key":"14_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29656-7","volume-title":"Fault Analysis in Cryptography","author":"M Joye","year":"2012","unstructured":"Joye, M., Tunstall, M.: Fault Analysis in Cryptography, vol. 147. Springer, Heidelberg (2012)"},{"key":"14_CR30","doi-asserted-by":"crossref","unstructured":"Juuti, M., Szyller, S., Dmitrenko, A., Marchal, S., Asokan, N.: PRADA: protecting against DNN model stealing attacks. CoRR abs\/1805.02628 (2018). http:\/\/arxiv.org\/abs\/1805.02628","DOI":"10.1109\/EuroSP.2019.00044"},{"issue":"3","key":"14_CR31","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1145\/2678373.2665726","volume":"42","author":"Y Kim","year":"2014","unstructured":"Kim, Y., et al.: Flipping bits in memory without accessing them: an experimental study of dram disturbance errors. ACM SIGARCH Comput. Archit. News 42(3), 361\u2013372 (2014)","journal-title":"ACM SIGARCH Comput. Archit. News"},{"key":"14_CR32","unstructured":"Krizhevsky, A., et al.: Learning multiple layers of features from tiny images (2009)"},{"key":"14_CR33","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Bartlett, P.L., Pereira, F.C.N., Burges, C.J.C., Bottou, L., Weinberger, K.Q. (eds.) Advances in Neural Information Processing Systems 25: 26th Annual Conference on Neural Information Processing Systems 2012. Proceedings of a Meeting Held, 3\u20136 December 2012, Lake Tahoe, Nevada, United States, pp. 1106\u20131114 (2012). https:\/\/proceedings.neurips.cc\/paper\/2012\/hash\/c399862d3b9d6b76c8436e924a68c45b-Abstract.html"},{"key":"14_CR34","unstructured":"LeCun, Y.: The mnist database of handwritten digits (1998). http:\/\/yann.lecun.com\/exdb\/mnist\/"},{"key":"14_CR35","doi-asserted-by":"publisher","unstructured":"Lee, T., Edwards, B., Molloy, I., Su, D.: Defending against neural network model stealing attacks using deceptive perturbations. In: 2019 IEEE Security and Privacy Workshops, SP Workshops 2019, San Francisco, CA, USA, 19\u201323 May 2019, pp. 43\u201349. IEEE (2019). https:\/\/doi.org\/10.1109\/SPW.2019.00020","DOI":"10.1109\/SPW.2019.00020"},{"key":"14_CR36","doi-asserted-by":"publisher","unstructured":"Liu, F., Yarom, Y., Ge, Q., Heiser, G., Lee, R.B.: Last-level cache side-channel attacks are practical. In: 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, 17\u201321 May 2015, pp. 605\u2013622. IEEE Computer Society (2015). https:\/\/doi.org\/10.1109\/SP.2015.43","DOI":"10.1109\/SP.2015.43"},{"key":"14_CR37","doi-asserted-by":"crossref","unstructured":"Liu, Y., Wei, L., Luo, B., Xu, Q.: Fault injection attack on deep neural network. In: Proceedings of the 36th International Conference on Computer-Aided Design, pp. 131\u2013138. IEEE Press (2017)","DOI":"10.1109\/ICCAD.2017.8203770"},{"key":"14_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-540-85053-3_22","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"N Mentens","year":"2008","unstructured":"Mentens, N., Gierlichs, B., Verbauwhede, I.: Power and fault analysis resistance in hardware through dynamic reconfiguration. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 346\u2013362. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85053-3_22"},{"issue":"3","key":"14_CR39","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s13389-014-0077-7","volume":"4","author":"N Moro","year":"2014","unstructured":"Moro, N., Heydemann, K., Encrenaz, E., Robisson, B.: Formal verification of a software countermeasure against instruction skip attacks. J. Cryptogr. Eng. 4(3), 145\u2013156 (2014). https:\/\/doi.org\/10.1007\/s13389-014-0077-7","journal-title":"J. Cryptogr. Eng."},{"key":"14_CR40","doi-asserted-by":"crossref","unstructured":"Murvay, P.S., Groza, B.: Dos attacks on controller area networks by fault injections from the software layer. In: Proceedings of the 12th International Conference on Availability, Reliability and Security, pp. 1\u201310 (2017)","DOI":"10.1145\/3098954.3103174"},{"issue":"2","key":"14_CR41","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MDAT.2019.2952336","volume":"37","author":"MA Neggaz","year":"2019","unstructured":"Neggaz, M.A., Alouani, I., Niar, S., Kurdahi, F.: Are cnns reliable enough for critical applications? an exploratory study. IEEE Des. Test 37(2), 76\u201383 (2019)","journal-title":"IEEE Des. Test"},{"key":"14_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-319-69453-5_13","volume-title":"Selected Areas in Cryptography \u2013 SAC 2016","author":"C Patrick","year":"2017","unstructured":"Patrick, C., Yuce, B., Ghalaty, N.F., Schaumont, P.: Lightweight fault attack resistance in software using intra-instruction redundancy. In: Avanzi, R., Heys, H. (eds.) SAC 2016. LNCS, vol. 10532, pp. 231\u2013244. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69453-5_13"},{"key":"14_CR43","doi-asserted-by":"publisher","unstructured":"Reparaz, O., Balasch, J., Verbauwhede, I.: Dude, is my code constant time? In: Atienza, D., Natale, G.D. (eds.) Design, Automation & Test in Europe Conference & Exhibition, DATE 2017, Lausanne, Switzerland, 27\u201331 March 2017, pp. 1697\u20131702. IEEE (2017). https:\/\/doi.org\/10.23919\/DATE.2017.7927267","DOI":"10.23919\/DATE.2017.7927267"},{"issue":"3","key":"14_CR44","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky, O., et al.: Imagenet large scale visual recognition challenge. Int. J. Comput. Vis. 115(3), 211\u2013252 (2015)","journal-title":"Int. J. Comput. Vis."},{"key":"14_CR45","doi-asserted-by":"publisher","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, 22\u201326 May 2017, pp. 3\u201318. IEEE Computer Society (2017). https:\/\/doi.org\/10.1109\/SP.2017.41","DOI":"10.1109\/SP.2017.41"},{"key":"14_CR46","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: Bengio, Y., LeCun, Y. (eds.) 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, 7\u20139 May 2015, Conference Track Proceedings (2015). http:\/\/arxiv.org\/abs\/1409.1556"},{"key":"14_CR47","unstructured":"Springenberg, J.T., Dosovitskiy, A., Brox, T., Riedmiller, M.: Striving for simplicity: The all convolutional net. arXiv preprint arXiv:1412.6806 (2014)"},{"key":"14_CR48","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)"},{"key":"14_CR49","doi-asserted-by":"publisher","unstructured":"Tiri, K., Verbauwhede, I.: A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation. In: 2004 Design, Automation and Test in Europe Conference and Exposition (DATE 2004), 16\u201320 February 2004, Paris, France, pp. 246\u2013251. IEEE Computer Society (2004). https:\/\/doi.org\/10.1109\/DATE.2004.1268856","DOI":"10.1109\/DATE.2004.1268856"},{"key":"14_CR50","doi-asserted-by":"publisher","first-page":"17322","DOI":"10.1109\/ACCESS.2017.2742698","volume":"5","author":"C Torres-Huitzil","year":"2017","unstructured":"Torres-Huitzil, C., Girau, B.: Fault and error tolerance in neural networks: a review. IEEE Access 5, 17322\u201317341 (2017)","journal-title":"IEEE Access"},{"key":"14_CR51","unstructured":"Tram\u00e8r, F., Zhang, F., Juels, A., Reiter, M.K., Ristenpart, T.: Stealing machine learning models via prediction APIs. In: 25th USENIX Security Symposium (USENIX Security 16), pp. 601\u2013618 (2016)"},{"key":"14_CR52","doi-asserted-by":"crossref","unstructured":"Velasco-Montero, D., Fern\u00e1ndez-Berni, J., Carmona-Gal\u00e1n, R., Rodr\u00edguez-V\u00e1zquez, \u00c1.: Performance analysis of real-time DNN inference on raspberry pi. In: Real-Time Image and Video Processing 2018, vol. 10670, p. 106700F. International Society for Optics and Photonics (2018)","DOI":"10.1117\/12.2309763"},{"key":"14_CR53","doi-asserted-by":"publisher","unstructured":"Wei, L., Luo, B., Li, Y., Liu, Y., Xu, Q.: I know what you see: power side-channel attack on convolutional neural network accelerators. In: Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, 03\u201307 December 2018, pp. 393\u2013406. ACM (2018). https:\/\/doi.org\/10.1145\/3274694.3274696","DOI":"10.1145\/3274694.3274696"},{"key":"14_CR54","unstructured":"Yan, M., Fletcher, C.W., Torrellas, J.: Cache telepathy: Leveraging shared resource attacks to learn DNN architectures. CoRR abs\/1808.04761 (2018). http:\/\/arxiv.org\/abs\/1808.04761"},{"key":"14_CR55","unstructured":"Yarom, Y., Falkner, K.: FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack. In: Fu, K., Jung, J. (eds.) Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, 20\u201322 August 2014, pp. 719\u2013732. USENIX Association (2014). https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/yarom"},{"key":"14_CR56","doi-asserted-by":"crossref","unstructured":"Yu, H., Ma, H., Yang, K., Zhao, Y., Jin, Y.: Deepem: deep neural networks model recovery through em side-channel information leakage. In: HOST (2020)","DOI":"10.1109\/HOST45689.2020.9300274"},{"key":"14_CR57","doi-asserted-by":"crossref","unstructured":"Zhao, P., Wang, S., Gongye, C., Wang, Y., Fei, Y., Lin, X.: Fault sneaking attack: a stealthy framework for misleading deep neural networks. In: 2019 56th ACM\/IEEE Design Automation Conference (DAC), pp. 1\u20136. IEEE (2019)","DOI":"10.1145\/3316781.3317825"},{"key":"14_CR58","doi-asserted-by":"crossref","unstructured":"Jovic, A., Jap, D., Papachristodoulou, L., Heuser, A.: Traditional machine learning methods for side-channel analysis. In: Batina, L., B\u00e4ck, T., Buhan, I., Picek, S. (eds.) Security and Artificial Intelligence. LNCS, vol. 13049, pp. 25\u201347. Springer, Cham (2022)","DOI":"10.1007\/978-3-030-98795-4_2"},{"key":"14_CR59","unstructured":"Kr\u010dek, M., et al.: Deep learning on side-channel analysis. In: Batina, L., B\u00e4ck, T., Buhan, I., Picek, S. (eds.) Security and Artificial Intelligence. LNCS, vol. 13049, pp. 48\u201371. Springer, Cham (2022)"}],"container-title":["Lecture Notes in Computer Science","Security and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-98795-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:43:35Z","timestamp":1675212215000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-98795-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030987947","9783030987954"],"references-count":59,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-98795-4_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"8 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}