{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:53:40Z","timestamp":1774367620798,"version":"3.50.1"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031281235","type":"print"},{"value":"9783031281242","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-28124-2_34","type":"book-chapter","created":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T10:20:17Z","timestamp":1680171617000},"page":"360-370","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Using Convolutional Neural Network to\u00a0Redress Outliers in\u00a0Clustering Based Side-Channel Analysis on\u00a0Cryptosystem"],"prefix":"10.1007","author":[{"given":"An","family":"Wang","sequence":"first","affiliation":[]},{"given":"Shulin","family":"He","sequence":"additional","affiliation":[]},{"given":"Congming","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Shaofei","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Yaoling","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Jiayao","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,31]]},"reference":[{"issue":"11","key":"34_CR1","doi-asserted-by":"publisher","first-page":"117","DOI":"10.3390\/aerospace6110117","volume":"6","author":"L Basora","year":"2019","unstructured":"Basora, L., Olive, X., Dubot, T.: Recent advances in anomaly detection methods applied to aviation. Aerospace 6(11), 117 (2019)","journal-title":"Aerospace"},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Carbone, M., et al.: Deep learning to evaluate secure RSA implementations. IACR Trans. Cryptograph. Hardw. Embed. Syst. 2019(2), 132\u2013161 (2019)","DOI":"10.46586\/tches.v2019.i2.132-161"},{"issue":"3","key":"34_CR3","doi-asserted-by":"publisher","first-page":"2009","DOI":"10.1109\/COMST.2020.2989392","volume":"22","author":"K Gai","year":"2020","unstructured":"Gai, K., Guo, J., Zhu, L., Yu, S.: Blockchain meets cloud computing: a survey. IEEE Commun. Surv. Tutor. 22(3), 2009\u20132030 (2020)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"6","key":"34_CR4","doi-asserted-by":"publisher","first-page":"4156","DOI":"10.1109\/TII.2019.2948094","volume":"16","author":"K Gai","year":"2019","unstructured":"Gai, K., Wu, Y., Zhu, L., Zhang, Z., Qiu, M.: Differential privacy-based blockchain for industrial internet-of-things. IEEE Trans. Industr. Inf. 16(6), 4156\u20134165 (2019)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"34_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-030-42068-0_6","volume-title":"Smart Card Research and Advanced Applications","author":"T Roche","year":"2020","unstructured":"Roche, T., Imbert, L., Lomn\u00e9, V.: Side-channel attacks on blinded scalar multiplications revisited. In: Bela\u00efd, S., G\u00fcneysu, T. (eds.) CARDIS 2019. LNCS, vol. 11833, pp. 95\u2013108. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-42068-0_6"},{"key":"34_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25"},{"key":"34_CR7","doi-asserted-by":"publisher","first-page":"57692","DOI":"10.1109\/ACCESS.2021.3072653","volume":"9","author":"D Kwon","year":"2021","unstructured":"Kwon, D., Kim, H., Hong, S.: Non-profiled deep learning-based side-channel preprocessing with autoencoders. IEEE Access 9, 57692\u201357703 (2021)","journal-title":"IEEE Access"},{"issue":"4","key":"34_CR8","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/s13389-017-0162-9","volume":"8","author":"L Lerman","year":"2018","unstructured":"Lerman, L., Poussier, R., Markowitch, O., Standaert, F.X.: Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version. J. Cryptogr. Eng. 8(4), 301\u2013313 (2018)","journal-title":"J. Cryptogr. Eng."},{"key":"34_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-319-75208-2_13","volume-title":"Smart Card Research and Advanced Applications","author":"E Nascimento","year":"2018","unstructured":"Nascimento, E., Chmielewski, \u0141: Applying horizontal clustering side-channel attacks on embedded ECC implementations. In: Eisenbarth, T., Teglia, Y. (eds.) CARDIS 2017. LNCS, vol. 10728, pp. 213\u2013231. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75208-2_13"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Perin, G., Chmielewski, \u0141., Batina, L., Picek, S.: Keep it unsupervised: horizontal attacks meet deep learning. IACR Trans. Cryptogr. Hardw. Embed. Syst, 2021(1), 343\u2013372 (2021)","DOI":"10.46586\/tches.v2021.i1.343-372"},{"key":"34_CR11","unstructured":"Picek, S., Perin, G., Mariot, L., Wu, L., Batina, L.: Sok: Deep learning-based physical side-channel analysis. Cryptology ePrint Archive (2021)"},{"issue":"6","key":"34_CR12","first-page":"1","volume":"3","author":"A Ram","year":"2010","unstructured":"Ram, A., Jalal, S., Jalal, A.S., Kumar, M.: A density based algorithm for discovering density varied clusters in large spatial databases. Int. J. Compu. Appl. 3(6), 1\u20134 (2010)","journal-title":"Int. J. Compu. Appl."},{"key":"34_CR13","doi-asserted-by":"crossref","unstructured":"Ravi, P., Jungk, B., Bhasin, S.: Single trace electromagnetic side-channel attacks on fpga implementation of elliptic curve cryptography. In: 2019 Joint International Symposium on Electromagnetic Compatibility, Sapporo and Asia-Pacific International Symposium on Electromagnetic Compatibility (EMC Sapporo\/APEMC), pp. 1\u20134. IEEE (2019)","DOI":"10.23919\/EMCSapporo\/APEMC44270.2019.9320846"},{"issue":"5","key":"34_CR14","doi-asserted-by":"publisher","first-page":"586","DOI":"10.26599\/TST.2018.9010047","volume":"23","author":"M Tang","year":"2018","unstructured":"Tang, M., et al.: Side-channel attacks in a real scenario. Tsinghua Sci. Technol. 23(5), 586\u2013598 (2018)","journal-title":"Tsinghua Sci. Technol."}],"container-title":["Lecture Notes in Computer Science","Smart Computing and Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-28124-2_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T10:44:11Z","timestamp":1680173051000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-28124-2_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031281235","9783031281242"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-28124-2_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SmartCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"smartc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cloud-conf.net\/smartcom\/2022\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"312","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}