{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T19:25:49Z","timestamp":1771529149809,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T00:00:00Z","timestamp":1771459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T00:00:00Z","timestamp":1771459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s10586-026-06034-8","type":"journal-article","created":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T18:52:56Z","timestamp":1771527176000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["HVLDL-SCA: Improving side channel analysis with horizontal and vertical label distribution learning"],"prefix":"10.1007","volume":"29","author":[{"given":"Shengcheng","family":"Xia","sequence":"first","affiliation":[]},{"given":"Lang","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,19]]},"reference":[{"key":"6034_CR1","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-031-25319-5_12","volume-title":"Smart Card Research and Advanced Applications","author":"Z Xu","year":"2023","unstructured":"Xu, Z., Pemberton, O., Oswald, D., Zheng, Z., Buhan, L., Schneider, T.: Reveal the invisible secret: Chosen-ciphertext side-channel attacks on ntru. In: Smart Card Research and Advanced Applications, pp. 227\u2013247. Springer International Publishing, Cham (2023)"},{"key":"6034_CR2","doi-asserted-by":"crossref","unstructured":"Xu. G., Rehman, A., Razzak, I.: Federated learning for privacy preservation of healthcare data from smartphone-based side-channel attacks, in: IEEE J Biomed Health Inform, Institute of Electrical and Electronics Engineers Inc, United States, pp. 684\u2013690 (2023)","DOI":"10.1109\/JBHI.2022.3171852"},{"issue":"9","key":"6034_CR3","doi-asserted-by":"publisher","first-page":"2163","DOI":"10.1109\/TC.2021.3122997","volume":"71","author":"Z Xu","year":"2022","unstructured":"Xu, Z., Pemberton, O., Roy, S.S., Oswald, D.F., Yao, W., Zheng, Z.: Magnifying side-channel leakage of lattice-based cryptosystems with chosen ciphertexts: The case study of kyber. IEEE Transactions on Computers 71(9), 2163\u20132176 (2022)","journal-title":"IEEE Transactions on Computers"},{"key":"6034_CR4","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-030-90019-9_14","volume-title":"Security and Privacy in Communication Networks","author":"X Duan","year":"2021","unstructured":"Duan, X., Li, Y., Tong, J., Li, X., He, S., Zhang, P.: Research of cpa attack methods based on ant colony algorithm. In: Security and Privacy in Communication Networks, pp. 270\u2013286. Springer International Publishing, Cham (2021)"},{"key":"6034_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122220","volume":"238","author":"AC Cob-Parro","year":"2024","unstructured":"Cob-Parro, A.C., Losada-Guti\u00e9rrez, C., Marr\u00f3n-Romera, M., Gardel-Vicente, A., Bravo-Mu\u00f1oz, I.: A new framework for deep learning video based human action recognition on the edge. Expert Systems with Applications 238, 122220 (2024)","journal-title":"Expert Systems with Applications"},{"key":"6034_CR6","doi-asserted-by":"crossref","unstructured":"Kong, F., Wang, X., Xue, C., Pu, K., Gao, W.: An optimized non-profiled deep learning-based power analysis with self-supervised autoencoders, in: 2023 8th International Conference on Signal and Image Processing (ICSIP), pp. 924\u2013929 (2023)","DOI":"10.1109\/ICSIP57908.2023.10270897"},{"issue":"1","key":"6034_CR7","first-page":"1","volume":"2020","author":"G Zaid","year":"2020","unstructured":"Zaid, G., Bossuet, L., Habrard, A., Venelli, A.: Methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1), 1\u201336 (2020)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"4","key":"6034_CR8","doi-asserted-by":"publisher","first-page":"337","DOI":"10.46586\/tches.v2020.i4.337-364","volume":"2020","author":"G Perin","year":"2020","unstructured":"Perin, G., Chmielewski, L., Picek, S.: Strength in numbers: Improving generalization with ensembles in machine learning-based profiled side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4), 337\u2013364 (2020)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"6034_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TETC.2022.3218372","volume":"12","author":"L Wu","year":"2024","unstructured":"Wu, L., Perin, G., Picek, S.: I choose you: Automated hyperparameter tuning for deep learning-based side-channel analysis. IEEE Transactions on Emerging Topics in Computing 12, 1 (2024)","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"issue":"3","key":"6034_CR10","doi-asserted-by":"publisher","first-page":"677","DOI":"10.46586\/tches.v2021.i3.677-707","volume":"2021","author":"J Rijsdijk","year":"2021","unstructured":"Rijsdijk, J., Wu, L., Perin, G., Picek, S.: Reinforcement learning for hyperparameter tuning in deep learning-based side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), 677\u2013707 (2021a)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"6034_CR11","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-319-10175-0_13","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"O Choudary","year":"2014","unstructured":"Choudary, O., Kuhn, M.G.: Template attacks on different devices. In: Constructive Side-Channel Analysis and Secure Design, vol. 8622, pp. 179\u2013198. Springer, Cham (2014)"},{"key":"6034_CR12","doi-asserted-by":"crossref","unstructured":"Luo, Z., Zheng, M., Wang, P., Jin, M., Zhang, J., Hu, H., Yu, N.: Towards strengthening deep learning-based side channel attacks with mixup, in: IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, Shenyang, China, pp. 791\u2013801 (2021)","DOI":"10.1109\/TrustCom53373.2021.00114"},{"issue":"1","key":"6034_CR13","doi-asserted-by":"publisher","first-page":"124","DOI":"10.13164\/re.2023.0124","volume":"32","author":"W Wang","year":"2023","unstructured":"Wang, W., Wang, J.N., Hu, F.L., Ni, F.: Sca-cgan:a new side-channel attack method for imbalanced small samples. Radioengineering. 32(1), 124\u2013135 (2023)","journal-title":"Radioengineering."},{"issue":"4","key":"6034_CR14","doi-asserted-by":"publisher","first-page":"4423","DOI":"10.1007\/s11227-023-05631-3","volume":"80","author":"D Li","year":"2024","unstructured":"Li, D., Li, L., Ou, Y.: Side-channel analysis based on siamese neural network. J. Supercomput. 80(4), 4423\u20134450 (2024)","journal-title":"J. Supercomput."},{"key":"6034_CR15","doi-asserted-by":"publisher","first-page":"3849","DOI":"10.1109\/TIFS.2023.3287728","volume":"18","author":"L Wu","year":"2023","unstructured":"Wu, L., Weissbart, L., Krcek, M., Li, H., Perin, G., Batina, L., Picek, S.: Label correlation in deep learning-based side-channel analysis. IEEE Trans. Inf. Forensics Secur. 18, 3849\u20133861 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"6034_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.mejo.2025.106721","volume":"162","author":"S Xia","year":"2025","unstructured":"Xia, S., Li, L., Ou, Y., Xiang, J.: Optimizing label correlation in deep learning-based side-channel analysis. Microelectron. J. 162, 106721 (2025)","journal-title":"Microelectron. J."},{"key":"6034_CR17","doi-asserted-by":"crossref","unstructured":"Wang, C., Dani, J., Reilly, S., Brownfield, A., Wang, B., Emmert, J.M.: Tripletpower: Deep-learning side-channel attacks over few traces, in: IEEE International Symposium on Hardware Oriented Security and Trust (HOST), IEEE, San Jose, CA, USA, pp. 167\u2013178 (2023)","DOI":"10.1109\/HOST55118.2023.10133495"},{"key":"6034_CR18","doi-asserted-by":"publisher","first-page":"1326926","DOI":"10.3389\/fspas.2024.1326926","volume":"11","author":"TJ Loredo","year":"2024","unstructured":"Loredo, T.J., Wolpert, R.L.: Bayesian inference: more than bayes\u2019s theorem. Frontiers in Astronomy and Space Sciences. 11, 1326926 (2024)","journal-title":"Frontiers in Astronomy and Space Sciences."},{"issue":"3","key":"6034_CR19","first-page":"1","volume":"1","author":"R Hay","year":"2024","unstructured":"Hay, R., Oswald, E.: Key rank estimation methods: Comparisons and practical considerations. IACR Communications in Cryptology. 1(3), 1 (2024)","journal-title":"IACR Communications in Cryptology."},{"issue":"3","key":"6034_CR20","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1109\/TBDATA.2023.3338023","volume":"10","author":"Y Lin","year":"2024","unstructured":"Lin, Y., Li, Y., Wang, C., Guo, L., Chen, J.: Label distribution learning based on horizontal and vertical mining of label correlations. IEEE Transactions on Big Data 10(3), 275\u2013287 (2024)","journal-title":"IEEE Transactions on Big Data"},{"key":"6034_CR21","doi-asserted-by":"publisher","first-page":"677","DOI":"10.46586\/tches.v2021.i3.677-707","volume":"3","author":"J Rijsdijk","year":"2021","unstructured":"Rijsdijk, J., Wu, L., Perin, G., Picek, S.: Reinforcement learning for hyperparameter tuning in deep learning-based side-channel analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems. 3, 677\u2013707 (2021b)","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems."},{"issue":"2","key":"6034_CR22","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s13389-019-00220-8","volume":"10","author":"R Benadjila","year":"2020","unstructured":"Benadjila, R., Prouff, E., Strullu, R., Cagli, E., Dumas, C.: Deep learning for side-channel analysis and introduction to ASCAD database. J. Cryptogr. Eng. 10(2), 163\u2013188 (2020)","journal-title":"J. Cryptogr. Eng."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-06034-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-026-06034-8","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-06034-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T18:52:58Z","timestamp":1771527178000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-026-06034-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,19]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["6034"],"URL":"https:\/\/doi.org\/10.1007\/s10586-026-06034-8","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,19]]},"assertion":[{"value":"25 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 December 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 February 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics declaration"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}],"article-number":"171"}}