{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T09:36:15Z","timestamp":1775036175295,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T00:00:00Z","timestamp":1769731200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T00:00:00Z","timestamp":1769731200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026,1,30]]},"DOI":"10.1109\/cnml68938.2026.11452358","type":"proceedings-article","created":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T19:49:32Z","timestamp":1774986572000},"page":"190-195","source":"Crossref","is-referenced-by-count":0,"title":["Guessing Entropy-Guided Bayesian Hyperparameter Optimization for Side-Channel Attacks"],"prefix":"10.1109","author":[{"given":"Maohuan","family":"Li","sequence":"first","affiliation":[{"name":"Information Engineering University,School of Cryptography Engineering,Zhengzhou,China"}]},{"given":"Yingjian","family":"Yan","sequence":"additional","affiliation":[{"name":"Information Engineering University,School of Cryptography Engineering,Zhengzhou,China"}]},{"given":"Yanjiang","family":"Liu","sequence":"additional","affiliation":[{"name":"Information Engineering University,School of Cryptography Engineering,Zhengzhou,China"}]},{"given":"Mingdeng","family":"Wang","sequence":"additional","affiliation":[{"name":"Information Engineering University,School of Cryptography Engineering,Zhengzhou,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3569577"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_3"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21476-4_2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49445-6_1"},{"issue":"10","key":"ref7","first-page":"140","article-title":"Side channel analysis attack based on deep learning LSTM[J]","volume":"47","author":"WANG","year":"2021","journal-title":"Computer Engineering"},{"issue":"2","key":"ref8","first-page":"308","article-title":"Side-channel attacks based on CBAPD network[J]","volume":"9","author":"ZHENG","year":"2022","journal-title":"Journal of Cryptologic Research"},{"issue":"6","key":"ref9","first-page":"268","article-title":"Side Channel Attack Fused with CNN_LSTM[J]","volume":"59","author":"PENG","year":"2023","journal-title":"Computer Engineering and Applications"},{"issue":"2","key":"ref10","first-page":"414","article-title":"Side channel attacks based on CLRM model[J]","volume":"12","author":"HUANG","year":"2025","journal-title":"Journal of Cryptologic Research"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-019-00220-8"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12060-7_14"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106622"},{"issue":"1","key":"ref14","first-page":"281","article-title":"Random search for hyper-parameter optimization[J]","volume":"13","author":"Bergstra","year":"2012","journal-title":"Journal of Machine Learning Research"},{"key":"ref15","article-title":"Practical bayesian optimization of machine learning algorithms[C]","volume-title":"25th International Conference on Neural Information Processing Systems","author":"Snoek"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3569577"},{"issue":"3","key":"ref17","first-page":"881","article-title":"Research on side channel analysis of block cipher algorithm based on MLP neural network[J]","volume":"38","author":"WANG","year":"2021","journal-title":"Application Research of Computers"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i1.1-36"},{"key":"ref19","first-page":"24","article-title":"Algorithms for hyper-parameter optimization[J]","author":"Bergstra","year":"2011","journal-title":"Advances in neural information processing systems"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07536-5_20"},{"key":"ref21","article-title":"Very deep convolutional networks for large-scale image recognition[J]","author":"Simonyan","year":"2014"},{"key":"ref22","first-page":"899","article-title":"Everything is Connected: From Model Learnability to Guessing Entropy[J]","volume":"2020","author":"Wu","year":"2020","journal-title":"IACR Cryptol. ePrint Arch."}],"event":{"name":"2026 International Conference on Communication Networks and Machine Learning (CNML)","location":"Chongqing, China","start":{"date-parts":[[2026,1,30]]},"end":{"date-parts":[[2026,2,1]]}},"container-title":["2026 International Conference on Communication Networks and Machine Learning (CNML)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11452215\/11452251\/11452358.pdf?arnumber=11452358","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T06:52:24Z","timestamp":1775026344000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11452358\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,30]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/cnml68938.2026.11452358","relation":{},"subject":[],"published":{"date-parts":[[2026,1,30]]}}}