{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:02:51Z","timestamp":1757617371459,"version":"3.44.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"7-8","license":[{"start":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T00:00:00Z","timestamp":1738281600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T00:00:00Z","timestamp":1738281600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004735","name":"Hunan Provincial Natural Science Foundation of China","doi-asserted-by":"crossref","award":["2022JJ30103"],"award-info":[{"award-number":["2022JJ30103"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"crossref"}]},{"name":"\"The 14th Five-Year Plan\" Key Disciplines and Application-oriented Special Disciplines of Hunan Province","award":["Xiangjiaotong [2022] 351"],"award-info":[{"award-number":["Xiangjiaotong [2022] 351"]}]},{"name":"Science and Technology Innovation Program of Hunan Province","award":["2016TP1020"],"award-info":[{"award-number":["2016TP1020"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s13042-025-02552-w","type":"journal-article","created":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T06:26:48Z","timestamp":1738304808000},"page":"4945-4960","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Tripm: a multi-label deep learning SCA model for multi-byte attacks"],"prefix":"10.1007","volume":"16","author":[{"given":"Lianrui","family":"Deng","sequence":"first","affiliation":[]},{"given":"Lang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Ou","sequence":"additional","affiliation":[]},{"given":"Jiahao","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Shengcheng","family":"Xia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,31]]},"reference":[{"issue":"12","key":"2552_CR1","doi-asserted-by":"publisher","first-page":"4463","DOI":"10.1109\/TCAD.2023.3289310","volume":"42","author":"E Katz","year":"2023","unstructured":"Katz E, Avital M, Weizman Y et al (2023) Analytical side channel EM models, extending simulation abilities for ics, and linking physical models to cryptographic metrics. IEEE Trans Comput Aided Des Integr Circuits Syst 42(12):4463\u20134476","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"key":"2552_CR2","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/TDSC.2017.2729549","volume":"17","author":"JV Cleemput","year":"2020","unstructured":"Cleemput JV, Sutter BD, Bosschere KD (2020) Adaptive compiler strategies for mitigating timing side channel attacks. IEEE Trans Depend Secure Comput 17:35\u201349","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"2552_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103883","volume":"142","author":"Y Baseri","year":"2024","unstructured":"Baseri Y, Chouhan V, Hafid A (2024) Navigating quantum security risks in networked environments: a comprehensive study of quantum-safe network protocols. Comput Secur 142:103883","journal-title":"Comput Secur"},{"key":"2552_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100888","volume":"23","author":"H Pourrahmani","year":"2023","unstructured":"Pourrahmani H, Yavarinasab A, Monazzah AMH et al (2023) A review of the security vulnerabilities and countermeasures in the internet of things solutions: a bright future for the blockchain. Internet Things 23:100888","journal-title":"Internet Things"},{"issue":"1","key":"2552_CR5","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1109\/COMST.2021.3127267","volume":"24","author":"E Bout","year":"2022","unstructured":"Bout E, Loscri V, Gallais A (2022) How machine learning changes the nature of cyberattacks on iot networks: a survey. IEEE Commun Surv Tutor 24(1):248\u2013279","journal-title":"IEEE Commun Surv Tutor"},{"issue":"2","key":"2552_CR6","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s13389-019-00212-8","volume":"10","author":"B Hettwer","year":"2020","unstructured":"Hettwer B, Gehrer S, G\u00fcneysu T (2020) Applications of machine learning techniques in side-channel attacks: a survey. J Cryptogr Eng 10(2):135\u2013162","journal-title":"J Cryptogr Eng"},{"key":"2552_CR7","doi-asserted-by":"publisher","first-page":"3849","DOI":"10.1109\/TIFS.2023.3287728","volume":"18","author":"L Wu","year":"2023","unstructured":"Wu L, Weissbart L, Kr\u010dek M et al (2023) Label correlation in deep learning-based side-channel analysis. IEEE Trans Inf Forensics Secur 18:3849\u20133861","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2552_CR8","doi-asserted-by":"publisher","first-page":"3863","DOI":"10.1109\/TIFS.2022.3216959","volume":"17","author":"P Cao","year":"2022","unstructured":"Cao P, Zhang C, Lu X et al (2022) Improving deep learning based second-order side-channel analysis with bilinear cnn. IEEE Trans Inf Forensics Secur 17:3863\u20133876","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2552_CR9","doi-asserted-by":"publisher","first-page":"5957","DOI":"10.1109\/ACCESS.2022.3140446","volume":"10","author":"D Kwon","year":"2022","unstructured":"Kwon D, Hong S, Kim H (2022) Optimizing implementations of non-profiled deep learning-based side-channel attacks. IEEE Access 10:5957\u20135967","journal-title":"IEEE Access"},{"issue":"3","key":"2552_CR10","doi-asserted-by":"publisher","first-page":"890","DOI":"10.13164\/re.2017.0890","volume":"26","author":"S Hou","year":"2017","unstructured":"Hou S, Zhou Y, Liu H et al (2017) Wavelet support vector machine algorithm in power analysis attacks. Radioengineering 26(3):890\u2013902","journal-title":"Radioengineering"},{"issue":"4","key":"2552_CR11","doi-asserted-by":"publisher","first-page":"4423","DOI":"10.1007\/s11227-023-05631-3","volume":"80","author":"D Li","year":"2024","unstructured":"Li D, Li L, Ou Y (2024) Side-channel analysis based on siamese neural network. J Supercomput 80(4):4423\u20134450","journal-title":"J Supercomput"},{"key":"2552_CR12","doi-asserted-by":"crossref","unstructured":"Zaid G, Bossuet L, Habrard A et\u00a0al (2020) Methodology for efficient cnn architectures in profiling attacks. IACR Trans Cryptogr Hardw Embedded Syst 1\u201336","DOI":"10.46586\/tches.v2020.i1.1-36"},{"key":"2552_CR13","doi-asserted-by":"crossref","unstructured":"Maghrebi H, Portigliatti T, Prouff E (2016) Breaking cryptographic implementations using deep learning techniques. Security, privacy, and applied cryptography engineering. Springer International Publishing, Cham, pp 3\u201326","DOI":"10.1007\/978-3-319-49445-6_1"},{"issue":"3","key":"2552_CR14","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1049\/cje.2021.04.003","volume":"30","author":"M Xiangliang","year":"2021","unstructured":"Xiangliang M, Bing L, Hong W et al (2021) Non-profiled deep-learning-based power analysis of the sm4 and des algorithms. Chin J Electron 30(3):500\u2013507","journal-title":"Chin J Electron"},{"key":"2552_CR15","doi-asserted-by":"crossref","unstructured":"Hajra S, Saha S, Alam M et\u00a0al (2022) Transnet: shift invariant transformer network for side channel analysis. In: International conference on cryptology in Africa. Springer, pp 371\u2013396","DOI":"10.1007\/978-3-031-17433-9_16"},{"issue":"2","key":"2552_CR16","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s13389-019-00220-8","volume":"10","author":"R Benadjila","year":"2020","unstructured":"Benadjila R, Prouff E, Strullu R et al (2020) Deep learning for side-channel analysis and introduction to ascad database. Journal of Cryptographic Engineering 10(2):163\u2013188","journal-title":"Journal of Cryptographic Engineering"},{"key":"2552_CR17","doi-asserted-by":"crossref","unstructured":"Thapar D, Alam M, Mukhopadhyay D (2021) Deep learning assisted cross-family profiled side-channel attacks using transfer learning. In: International symposium on quality electronic design (ISQED). IEEE, San Jose, CA, USA, pp 178\u2013185","DOI":"10.1109\/ISQED51717.2021.9424254"},{"key":"2552_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.mejo.2023.105901","volume":"139","author":"L Ni","year":"2023","unstructured":"Ni L, Wang P, Zhang Y et al (2023) Profiling side-channel attacks based on cnn model fusion. Microelectron J 139:105901","journal-title":"Microelectron J"},{"key":"2552_CR19","doi-asserted-by":"crossref","unstructured":"Cagli E, Dumas C, Prouff E (2017) Convolutional neural networks with data augmentation against jitter-based countermeasures: profiling attacks without pre-processing. In: Cryptographic hardware and embedded systems. Springer, Taipei, pp 45\u201368","DOI":"10.1007\/978-3-319-66787-4_3"},{"issue":"4","key":"2552_CR20","doi-asserted-by":"publisher","first-page":"76","DOI":"10.5755\/j02.eie.33995","volume":"29","author":"AA Ahmed","year":"2023","unstructured":"Ahmed AA, Hasan MK, Islam S et al (2023) Design of convolutional neural networks architecture for non-profiled side-channel attack detection. Elektronika Ir Elektrotechnika 29(4):76\u201381","journal-title":"Elektronika Ir Elektrotechnika"},{"issue":"3","key":"2552_CR21","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/s13389-023-00314-4","volume":"14","author":"NT Do","year":"2024","unstructured":"Do NT, Hoang VP, Doan VS (2024) A novel non-profiled side channel attack based on multi-output regression neural network. J Cryptogr Eng 14(3):427\u2013439","journal-title":"J Cryptogr Eng"},{"key":"2552_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123198","volume":"246","author":"M Faraji","year":"2024","unstructured":"Faraji M, Seyedi SA, Tab FA et al (2024) Multi-label feature selection with global and local label correlation. Expert Syst Appl 246:123198","journal-title":"Expert Syst Appl"},{"issue":"6","key":"2552_CR23","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.1109\/TCAD.2020.3033495","volume":"40","author":"L Zhang","year":"2020","unstructured":"Zhang L, Xing X, Fan J et al (2020) Multilabel deep learning-based side-channel attack. IEEE Trans Comput Aided Des Integr Circuits Syst 40(6):1207\u20131216","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"issue":"3","key":"2552_CR24","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1587\/transfun.2022CIP0015","volume":"106","author":"Y Fukuda","year":"2023","unstructured":"Fukuda Y, Yoshida K, Hashimoto H et al (2023) Profiling deep learning side-channel attacks using multi-label against aes circuits with rsm countermeasure. IEICE Trans Fundam Electron Commun Comput Sci 106(3):294\u2013305","journal-title":"IEICE Trans Fundam Electron Commun Comput Sci"},{"key":"2552_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-021-00444-8","volume":"8","author":"L Alzubaidi","year":"2021","unstructured":"Alzubaidi L, Zhang J, Humaidi AJ et al (2021) Review of deep learning: concepts, cnn architectures, challenges, applications, future directions. J Big Data 8:1\u201374","journal-title":"J Big Data"},{"key":"2552_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100379","volume":"40","author":"S Dong","year":"2021","unstructured":"Dong S, Wang P, Abbas K (2021) A survey on deep learning and its applications. Comput Sci Rev 40:100379","journal-title":"Comput Sci Rev"},{"key":"2552_CR27","first-page":"209","volume":"1","author":"S Picek","year":"2019","unstructured":"Picek S, Heuser A, Jovic A et al (2019) The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations. IACR Trans Cryptogr Hardw Embedded Syst 1:209\u2013237","journal-title":"IACR Trans Cryptogr Hardw Embedded Syst"},{"key":"2552_CR28","doi-asserted-by":"crossref","unstructured":"Wouters L, Arribas V, Gierlichs B, et\u00a0al (2020) Revisiting a methodology for efficient cnn architectures in profiling attacks. IACR Trans Cryptogr Hardw Embedded Syst 147\u2013168","DOI":"10.46586\/tches.v2020.i3.147-168"},{"key":"2552_CR29","doi-asserted-by":"crossref","unstructured":"Li H, Ninan M, Wang B et\u00a0al (2024) Tinypower: side-channel attacks with tiny neural networks. In: 2024 IEEE international symposium on hardware oriented security and trust (HOST), IEEE, pp 320\u2013331","DOI":"10.1109\/HOST55342.2024.10545382"},{"key":"2552_CR30","doi-asserted-by":"publisher","first-page":"677","DOI":"10.46586\/tches.v2021.i3.677-707","volume":"3","author":"J Rijsdijk","year":"2021","unstructured":"Rijsdijk J, Wu L, Perin G et al (2021) Reinforcement learning for hyperparameter tuning in deep learning-based side-channel analysis. IACR Trans Cryptogr Hardw Embedded Syst 3:677\u2013707","journal-title":"IACR Trans Cryptogr Hardw Embedded Syst"},{"issue":"2","key":"2552_CR31","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1109\/TETC.2022.3218372","volume":"12","author":"L Wu","year":"2024","unstructured":"Wu L, Perin G, Picek S (2024) I choose you: automated hyperparameter tuning for deep learning-based side-channel analysis. IEEE Trans Emerg Top Comput 12(2):546\u2013557","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"2552_CR32","doi-asserted-by":"crossref","unstructured":"Luo Z, Zheng M, Wang P et al (2021) Towards strengthening deep learning-based side channel attacks with mixup. In: International conference on trust, security and privacy in computing and communications (TrustCom). IEEE, Guangzhou, China, pp 791\u2013801","DOI":"10.1109\/TrustCom53373.2021.00114"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02552-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-025-02552-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02552-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T04:31:06Z","timestamp":1757133066000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-025-02552-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,31]]},"references-count":32,"journal-issue":{"issue":"7-8","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["2552"],"URL":"https:\/\/doi.org\/10.1007\/s13042-025-02552-w","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"type":"print","value":"1868-8071"},{"type":"electronic","value":"1868-808X"}],"subject":[],"published":{"date-parts":[[2025,1,31]]},"assertion":[{"value":"9 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No potential Conflict of interest was reported by the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}