{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T19:22:54Z","timestamp":1771960974894,"version":"3.50.1"},"reference-count":80,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004515","name":"Universiti Kebangsaan Malaysia","doi-asserted-by":"publisher","award":["GUP 2023-010"],"award-info":[{"award-number":["GUP 2023-010"]}],"id":[{"id":"10.13039\/501100004515","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3431218","type":"journal-article","created":{"date-parts":[[2024,7,19]],"date-time":"2024-07-19T17:40:05Z","timestamp":1721410805000},"page":"188435-188453","source":"Crossref","is-referenced-by-count":19,"title":["Review on Hybrid Deep Learning Models for Enhancing Encryption Techniques Against Side Channel Attacks"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6069-2967","authenticated-orcid":false,"given":"Amjed A.","family":"Ahmed","sequence":"first","affiliation":[{"name":"Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5511-0205","authenticated-orcid":false,"given":"Mohammad Kamrul","family":"Hasan","sequence":"additional","affiliation":[{"name":"Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7337-6736","authenticated-orcid":false,"given":"Azana H.","family":"Aman","sequence":"additional","affiliation":[{"name":"Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Malaysia"}]},{"given":"Nurhizam","family":"Safie","sequence":"additional","affiliation":[{"name":"Research Center for Software Technology and Management (SOFTAM), Faculty of Information Science and Technology (FTSM), Universiti Kebangsaan Malaysia, Bangi, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0490-7799","authenticated-orcid":false,"given":"Shayla","family":"Islam","sequence":"additional","affiliation":[{"name":"Institute of Computer Science and Digital Innovation, UCSI University, Kuala Lumpur, Malaysia"}]},{"given":"Fatima A.","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Computer Science Department, College of Computer Engineering and Science, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3738-6731","authenticated-orcid":false,"given":"Thowiba E.","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Computer Science Department, College of Science and Humanities-Jubail, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5593-8985","authenticated-orcid":false,"given":"Bishwajeet","family":"Pandey","sequence":"additional","affiliation":[{"name":"Department of Intelligent System and Cyber Security, Astana IT University, Astana, Kazakhstan"}]},{"given":"Leila","family":"Rzayeva","sequence":"additional","affiliation":[{"name":"Department of Intelligent System and Cyber Security, Astana IT University, Astana, Kazakhstan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/acctcs52002.2021.00046"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/cr.2018.8626831"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2019.2947468"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.17576\/apjitm-2018-0702-07"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3134256"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/itnac59571.2023.10368560"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3486001.3486224"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ITNAC59571.2023.10368563"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i4.800-827"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-021-00563-6"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3380068"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2022.0047"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2022.3185608"},{"key":"ref15","first-page":"1","article-title":"Survey for performance & security problems of passive side-channel attacks countermeasures in ECC","volume":"1","author":"Abarzua","year":"2019","journal-title":"Cryptol. ePrint Arch."},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00154"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3372018"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD50377.2020.00094"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.17576\/apjitm-2021-1001-04"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.17576\/apjitm-2023-1202-10"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3117761"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.17576\/apjitm-2024-1301-01"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED51717.2021.9424305"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23221"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2019.8740839"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-35869-3_8"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2020.2973007"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-01770-0"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography4020015"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/iSES50453.2020.00041"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2019.2953855"},{"key":"ref32","first-page":"29","article-title":"Advanced far field EM side-channel attack on AES","volume-title":"Proc. 7th ACM Cyber-Phys. Syst. Secur. Workshop","author":"Wang"},{"issue":"2023","key":"ref33","first-page":"4922","article-title":"Design of a novel deep learning methodology for IoT botnet based attack detection","volume":"11","author":"Kumar","year":"2023","journal-title":"Int. J. Recent Innov. Trends Comput. Commun."},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/app10030984"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300263"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3603273.3630505"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2926324"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i4.676-707"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3411504.3421214"},{"key":"ref40","first-page":"1","article-title":"Power side channel attack analysis and detection","volume-title":"Proc. IEEE\/ACM Int. Conf. Comput. Aided Design (ICCAD)","author":"Gattu"},{"key":"ref41","first-page":"1","article-title":"PAPP: Prefetcher-aware prime and probe side-channel attack","volume-title":"Proc. 56th ACM\/IEEE Design Autom. Conf. (DAC)","author":"Wang"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3055833"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2019.i3.305-339"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833794"},{"key":"ref45","first-page":"119","article-title":"A power side-channel attack on the CCA2-secure HQC KEM","volume-title":"Proc. 19th Int. Conf.","author":"Schamberger"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3045161"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI-SoC53125.2021.9606988"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2021.3052146"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300259"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/VR50410.2021.00081"},{"key":"ref51","first-page":"1","article-title":"Message-recovery profiled side-channel attack on the classic McEliece cryptosystem","volume":"1","author":"Colombier","year":"2022","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/cicc48029.2020.9075889"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2020.11.283"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i2.166-191"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i1.321-347"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3460392"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/jetcas.2021.3077887"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.5755\/j02.eie.34650"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053913"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3019323"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3337167.3337169"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-023-02128-4"},{"key":"ref63","first-page":"1","article-title":"Prim: Deep learning for side-channel attacks on AES","volume":"1","author":"Berreby","year":"2022","journal-title":"A Preprint"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00755-w"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.13052\/jwe1540-9589.2127"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.7546\/CRABS.2023.06.14"},{"key":"ref67","first-page":"1","article-title":"Hiding in plain sight: Non-profiling deep learning-based side-channel analysis with plaintext\/ciphertext","volume":"1","author":"Wu","year":"2023","journal-title":"Cryptol. ePrint Arch."},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3152831"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103383"},{"key":"ref70","article-title":"SCNet: A neural network for automated side-channel attack","author":"Li","year":"2020","journal-title":"arXiv:2008.00476"},{"issue":"1","key":"ref71","first-page":"49","article-title":"The effectiveness of URL features on phishing emails classification using machine learning approach","volume":"1","author":"Zakaria","year":"2022","journal-title":"Asia\u2013Pacific J. Inf. Technol. Multimedia"},{"key":"ref72","article-title":"Volcano: Stateless cache side-channel attack by exploiting mesh interconnect","author":"Wan","year":"2021","journal-title":"arXiv:2103.04533"},{"key":"ref73","first-page":"9","article-title":"Power-based side channel attack analysis on PQC algorithms","volume":"1","author":"Kamucheka","year":"2021","journal-title":"Cryptol. ePrint Arch."},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/3371393"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3465380"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9474155"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.17576\/apjitm-2023-1201-02"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2021.3065189"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIKE47802.2019.9004435"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2020.07.452"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10604855.pdf?arnumber=10604855","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T06:11:32Z","timestamp":1734588692000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10604855\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":80,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3431218","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}