{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:25:45Z","timestamp":1759335945498,"version":"3.37.3"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,1]]},"DOI":"10.1109\/host55118.2023.10133491","type":"proceedings-article","created":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T17:29:36Z","timestamp":1685035776000},"page":"144-154","source":"Crossref","is-referenced-by-count":5,"title":["Dual-Leak: Deep Unsupervised Active Learning for Cross-Device Profiled Side-Channel Leakage Analysis"],"prefix":"10.1109","author":[{"given":"Honggang","family":"Yu","sequence":"first","affiliation":[{"name":"University of Florida"}]},{"given":"Shuo","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Haoqi","family":"Shan","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Maximillian","family":"Panoff","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Michael","family":"Lee","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Kaichen","family":"Yang","sequence":"additional","affiliation":[{"name":"Michigan Technological University"}]},{"given":"Yier","family":"Jin","sequence":"additional","affiliation":[{"name":"University of Florida"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317934"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00976"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12041054"},{"key":"ref34","first-page":"1183","article-title":"Deep bayesian active learning with image data","volume":"70","author":"gal","year":"2017","journal-title":"Proceedings of the 34th International Conference on Machine Learning"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586100"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2099-5_1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218693"},{"key":"ref36","article-title":"Adversarial active learning for deep networks: a margin based approach","volume":"abs 1802","author":"ducoffe","year":"2018","journal-title":"CoRR"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5432"},{"key":"ref30","first-page":"8355","article-title":"Finding the homology of decision boundaries with active learning","volume":"33","author":"li","year":"2020","journal-title":"Advances in neural information processing systems"},{"key":"ref11","article-title":"Enhancing the performance of practical profiling side-channel at-tacks using conditional generative adversarial networks","author":"wang","year":"2020","journal-title":"arXiv preprint arXiv 2007 00808"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00014"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i3.148-179"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i9.17013"},{"key":"ref2","first-page":"243","article-title":"Template attacks on masking-resistance is futile","author":"oswald","year":"2007","journal-title":"Proceedings of the 7th Cryptographers' Track at the RSA Conference on Topics in Cryptology ser CT-RSA'07"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Advances in Cryptology ? CRYPTO? 99"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530517"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref16","article-title":"Improving Side-Channel Analysis through Semi-Supervised Learning","author":"picek","year":"2018","journal-title":"CARDIS 2018 - 17th Smart Card Research and Advanced Application Conference"},{"key":"ref38","article-title":"Active learning for convolutional neural networks: A core-set approach","author":"sener","year":"2018","journal-title":"International Conference on Learning Representations"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00114"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01258-8_36"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i1.25-55"},{"key":"ref23","first-page":"413","article-title":"The best of two worlds: Deep learning-assisted template attack","volume":"2022","author":"wu","year":"2021","journal-title":"IACR Trans Cryptogr Hardw Embed Syst"},{"key":"ref26","volume":"abs 1605 7277","author":"papernot","year":"2016","journal-title":"Transferability in machine learning from phenomena to black-box attacks using adversarial samples"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3115\/1613715.1613855"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01214"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_26"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24178"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218705"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i4.49-85"},{"key":"ref28","first-page":"1289","article-title":"Multiple-instance active learning","author":"settles","year":"2008","journal-title":"Advances in Neural Information Processing Systems 20"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.07.023"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00157"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i1.348-375"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i1.1-36"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i3.147-168"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45418-7_17"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-44709-1_21","article-title":"Electromagnetic analysis: Concrete results","volume":"2162","author":"gandolfi","year":"2001","journal-title":"Cryptographic Hardware and Embedded Systems ? CHES 2001"},{"key":"ref6","first-page":"645","article-title":"Deep neural network attribution methods for leakage analysis and symmetric key recovery","volume":"26","author":"hettwer","year":"2019","journal-title":"Selected Areas in Cryptography-SAC 2019-26th International Conference"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3033495"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00090"}],"event":{"name":"2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2023,5,1]]},"location":"San Jose, CA, USA","end":{"date-parts":[[2023,5,4]]}},"container-title":["2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10132842\/10132914\/10133491.pdf?arnumber=10133491","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T17:56:11Z","timestamp":1686592571000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10133491\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,1]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/host55118.2023.10133491","relation":{},"subject":[],"published":{"date-parts":[[2023,5,1]]}}}