{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:55:29Z","timestamp":1770227729091,"version":"3.49.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T00:00:00Z","timestamp":1654560000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T00:00:00Z","timestamp":1654560000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s13042-022-01588-6","type":"journal-article","created":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T06:02:53Z","timestamp":1654581773000},"page":"3199-3209","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["ESRM: an efficient regression model based on random kernels for side channel analysis"],"prefix":"10.1007","volume":"13","author":[{"given":"Yu","family":"Ou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4832-4499","authenticated-orcid":false,"given":"Lang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Di","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,7]]},"reference":[{"issue":"5","key":"1588_CR1","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1109\/TIFS.2016.2516905","volume":"11","author":"F Zhang","year":"2016","unstructured":"Zhang F, Guo S, Zhao X, Wang T, Yang J, Standaert F, Gu D (2016) A framework for the analysis and evaluation of algebraic fault attacks on lightweight block ciphers. IEEE Trans Inf Forensics Secur 11(5):1039\u20131054","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1588_CR2","doi-asserted-by":"crossref","unstructured":"Genkin D, Pachmanov L, Pipman I, Tromer E (2015) Stealing keys from pcs using a radio: cheap electromagnetic attacks on windowed exponentiation. In: Cryptographic Hardware and Embedded Systems\u2014CHES 2015 9293:208\u2013228","DOI":"10.1007\/978-3-662-48324-4_11"},{"key":"1588_CR3","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/TDSC.2017.2729549","volume":"17","author":"J Van Cleemput","year":"2017","unstructured":"Van Cleemput J, De Sutter B, De Bosschere K (2017) Adaptive compiler strategies for mitigating timing side channel attacks. IEEE Trans Depend Secur Comput 17:35\u201349","journal-title":"IEEE Trans Depend Secur Comput"},{"key":"1588_CR4","doi-asserted-by":"crossref","unstructured":"Kannwischer MJ, Gen\u00eat A, Butin D, Kr\u00e4mer J, Buchmann J (2018) Differential power analysis of XMSS and sphincs. In: Constructive Side-Channel Analysis and Secure Design (COSADE 2018) 10815:168\u2013188","DOI":"10.1007\/978-3-319-89641-0_10"},{"issue":"2","key":"1588_CR5","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1080\/23742917.2016.1231523","volume":"1","author":"O Lo","year":"2017","unstructured":"Lo O, Buchanan WJ, Carson D (2017) Power analysis attacks on the AES-128 s-box using differential power analysis (DPA) and correlation power analysis (cpa). J Cyber Secur Technol 1(2):88\u2013107","journal-title":"J Cyber Secur Technol"},{"issue":"1","key":"1588_CR6","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1109\/TPS.2018.2874955","volume":"47","author":"B-S Go","year":"2018","unstructured":"Go B-S, Le D-V, Song M-G, Park M, In-Keun Y (2018) Design and electromagnetic analysis of an induction-type Coilgun system with a pulse power module. IEEE Trans Plasma Sci 47(1):971\u2013976","journal-title":"IEEE Trans Plasma Sci"},{"key":"1588_CR7","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s13389-020-00228-5","volume":"11","author":"T Perianin","year":"2020","unstructured":"Perianin T, Carr\u00e9 S, Dyseryn V, Facon A, Guilley S (2020) End-to-end automated cache-timing attack driven by machine learning. J Cryptogr Eng 11:135\u2013146","journal-title":"J Cryptogr Eng"},{"key":"1588_CR8","doi-asserted-by":"crossref","unstructured":"Chari S, Rao JR, Rohatgi P (2003) Template attacks. In: Cryptographic Hardware and Embedded Systems\u2014CHES 2002 2523:13\u201328","DOI":"10.1007\/3-540-36400-5_3"},{"key":"1588_CR9","doi-asserted-by":"crossref","unstructured":"Wunan W, Hao C, Jun C (2019) The attack case of ECDSA on blockchain based on improved simple power analysis. In: International Conference on Artificial Intelligence and Security. Springer, pp 120\u2013132","DOI":"10.1007\/978-3-030-24268-8_12"},{"issue":"4","key":"1588_CR10","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s13389-011-0023-x","volume":"1","author":"G Hospodar","year":"2011","unstructured":"Hospodar G, Gierlichs B, De Mulder E, Verbauwhede I, Vandewalle J (2011) Machine learning in side-channel analysis: a first study. J Cryptogr Eng 1(4):293\u2013302","journal-title":"J Cryptogr Eng"},{"key":"1588_CR11","volume-title":"Least squares support vector machines","author":"J De Brabanter","year":"2002","unstructured":"De Brabanter J, De Moor B, Johan AKS, Van Gestel T, Vandewalle JPL (2002) Least squares support vector machines. World Scientific, London"},{"key":"1588_CR12","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1016\/j.patcog.2016.07.012","volume":"60","author":"F Zhu","year":"2016","unstructured":"Zhu F, Yang J, Gao J, Chunyan X (2016) Extended nearest neighbor chain induced instance-weights for svms. Pattern Recogn 60:863\u2013874","journal-title":"Pattern Recogn"},{"key":"1588_CR13","doi-asserted-by":"crossref","unstructured":"Heuser A, Zohner M (2012) Intelligent machine homicide-breaking cryptographic devices using support vector machines. In: Constructive Side-Channel Analysis and Secure Design. COSADE 2012. 7275:249\u2013264","DOI":"10.1007\/978-3-642-29912-4_18"},{"key":"1588_CR14","doi-asserted-by":"crossref","unstructured":"Bartkewitz T, Lemke-Rust K (2013) Efficient template attacks based on probabilistic multi-class support vector machines. In: Smart Card Research and Advanced Applications. CARDIS 2012 7771:263\u2013276","DOI":"10.1007\/978-3-642-37288-9_18"},{"key":"1588_CR15","doi-asserted-by":"crossref","unstructured":"Martinasek Z, Dzurenda P, Malina L (2016) Profiling power analysis attack based on MLP in DPA contest v4.2. In: 2016 39th International Conference on Telecommunications and Signal Processing (TSP), pp 223\u2013226","DOI":"10.1109\/TSP.2016.7760865"},{"key":"1588_CR16","first-page":"04","volume":"1","author":"M Alazab","year":"2020","unstructured":"Alazab M, Khan S, Somayaji S, Pham Q-V, Reddy P, Gadekallu T (2020) A multidirectional ISTM model for predicting the stability of a smart grid. IEEE Access 1:04","journal-title":"IEEE Access"},{"key":"1588_CR17","doi-asserted-by":"crossref","unstructured":"Picek S, Samiotis IP, Kim J, Heuser A, Bhasin S, Legay A (2018) On the performance of convolutional neural networks for side-channel analysis. In: Security, Privacy, and Applied Cryptography Engineering. SPACE 2018 11348:157\u2013176","DOI":"10.1007\/978-3-030-05072-6_10"},{"issue":"2","key":"1588_CR18","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s13389-019-00220-8","volume":"10","author":"R Benadjila","year":"2020","unstructured":"Benadjila R, Prouff E, Strullu R, Cagli E, Dumas C (2020) Deep learning for side-channel analysis and introduction to ASCAD database. J Cryptogr Eng 10(2):163\u2013188","journal-title":"J Cryptogr Eng"},{"key":"1588_CR19","doi-asserted-by":"crossref","unstructured":"Kim J, Lee JK, Lee KM (2016) Accurate image super-resolution using very deep convolutional networks. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 2016:1646\u20131654","DOI":"10.1109\/CVPR.2016.182"},{"key":"1588_CR20","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"1588_CR21","doi-asserted-by":"crossref","unstructured":"Kubota T, Yoshida K, Shiozaki M, Fujino T (2020) Deep learning side-channel attack against hardware implementations of AES. Microprocess Microsyst 103383","DOI":"10.1016\/j.micpro.2020.103383"},{"issue":"6","key":"1588_CR22","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.1109\/TCAD.2020.3033495","volume":"40","author":"L Zhang","year":"2021","unstructured":"Zhang L, Xing X, Fan J, Wang Z, Wang S (2021) Multilabel deep learning-based side-channel attack. IEEE Trans Comput Aided Des Integr Circuits Syst 40(6):1207\u20131216","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"issue":"2","key":"1588_CR23","first-page":"1","volume":"16","author":"O Yu","year":"2022","unstructured":"Yu O, Li L (2022) Side-channel analysis attacks based on deep learning network. Front Comp Sci 16(2):1\u201311","journal-title":"Front Comp Sci"},{"key":"1588_CR24","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1007\/s10618-016-0483-9","volume":"31","author":"A Bagnall","year":"2017","unstructured":"Bagnall A, Lines J, Bostrom A, Large J, Keogh E (2017) The great time series classification bake off: a review and experimental evaluation of recent algorithmic advances. Data Min Knowl Disc 31:606\u2013660","journal-title":"Data Min Knowl Disc"},{"issue":"4","key":"1588_CR25","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1007\/s10618-019-00619-1","volume":"33","author":"H Ismail Fawaz","year":"2019","unstructured":"Ismail Fawaz H, Forestier G, Weber J, Idoumghar L, Muller P-A (2019) Deep learning for time series classification: a review. Data Min Knowl Disc 33(4):917\u2013963","journal-title":"Data Min Knowl Disc"},{"key":"1588_CR26","doi-asserted-by":"publisher","first-page":"1454","DOI":"10.1007\/s10618-020-00701-z","volume":"34","author":"A Dempster","year":"2020","unstructured":"Dempster A, Petitjean F, Webb G (2020) Rocket: exceptionally fast and accurate time series classification using random convolutional kernels. Data Min Knowl Disc 34:1454\u20131495, 09","journal-title":"Data Min Knowl Disc"},{"key":"1588_CR27","doi-asserted-by":"crossref","unstructured":"Schindler W, Lemke K, Paar C (2005) A stochastic model for differential side channel cryptanalysis. In: International Workshop on Cryptographic Hardware and Embedded Systems. Springer, pp 30\u201346","DOI":"10.1007\/11545262_3"},{"key":"1588_CR28","doi-asserted-by":"publisher","first-page":"108422","DOI":"10.1016\/j.patcog.2021.108422","volume":"123","author":"F Zhu","year":"2022","unstructured":"Zhu F, Gao J, Yang J, Ye N (2022) Neighborhood linear discriminant analysis. Pattern Recogn 123:108422","journal-title":"Pattern Recogn"},{"issue":"6","key":"1588_CR29","doi-asserted-by":"publisher","first-page":"1293","DOI":"10.1109\/JAS.2019.1911747","volume":"6","author":"HA Dau","year":"2019","unstructured":"Dau HA, Bagnall A, Kamgar K, Yeh C-CM, Zhu Y, Gharghabi S, Ratanamahatana CA, Keogh E (2019) The UCR time series archive. IEEE\/CAA J Autom Sin 6(6):1293\u20131305","journal-title":"IEEE\/CAA J Autom Sin"},{"issue":"1","key":"1588_CR30","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1007\/s11071-020-06111-6","volume":"103","author":"M-W Li","year":"2021","unstructured":"Li M-W, Wang Y-T, Geng J, Hong W-C (2021) Chaos cloud quantum bat hybrid optimization algorithm. Nonlinear Dyn 103(1):1167\u20131193","journal-title":"Nonlinear Dyn"},{"key":"1588_CR31","doi-asserted-by":"publisher","first-page":"107297","DOI":"10.1016\/j.knosys.2021.107297","volume":"228","author":"Z Zhang","year":"2021","unstructured":"Zhang Z, Hong W-C (2021) Application of variational mode decomposition and chaotic grey wolf optimizer with support vector regression for forecasting electric loads. Knowl-Based Syst 228:107297","journal-title":"Knowl-Based Syst"},{"issue":"1","key":"1588_CR32","first-page":"1","volume":"2020","author":"G Zaid","year":"2020","unstructured":"Zaid G, Bossuet L, Habrard A, Venelli A (2020) Methodology for efficient CNN architectures in profiling attacks. IACR Trans Cryptogr Hardw Embed Syst 2020(1):1\u201336","journal-title":"IACR Trans Cryptogr Hardw Embed Syst"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-022-01588-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-022-01588-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-022-01588-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,27]],"date-time":"2022-08-27T05:08:42Z","timestamp":1661576922000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-022-01588-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,7]]},"references-count":32,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["1588"],"URL":"https:\/\/doi.org\/10.1007\/s13042-022-01588-6","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,7]]},"assertion":[{"value":"22 August 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}