{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:58:36Z","timestamp":1775667516941,"version":"3.50.1"},"reference-count":51,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,1]]},"DOI":"10.1109\/host55118.2023.10133495","type":"proceedings-article","created":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T17:29:36Z","timestamp":1685035776000},"page":"167-178","source":"Crossref","is-referenced-by-count":11,"title":["TripletPower: Deep-Learning Side-Channel Attacks over Few Traces"],"prefix":"10.1109","author":[{"given":"Chenggang","family":"Wang","sequence":"first","affiliation":[{"name":"University of Cincinnati"}]},{"given":"Jimmy","family":"Dani","sequence":"additional","affiliation":[{"name":"University of Cincinnati"}]},{"given":"Shane","family":"Reilly","sequence":"additional","affiliation":[{"name":"University of Cincinnati"}]},{"given":"Austen","family":"Brownfield","sequence":"additional","affiliation":[{"name":"University of Cincinnati"}]},{"given":"Boyang","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Cincinnati"}]},{"given":"John M.","family":"Emmert","sequence":"additional","affiliation":[{"name":"University of Cincinnati"}]}],"member":"263","reference":[{"key":"ref13","author":"wu","year":"0","journal-title":"I Choose You Automated Hyperparameter Tuning for Deep Learning-based Side-Channel Analysis"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.3013196"},{"key":"ref15","first-page":"25","article-title":"Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis","volume":"2021","author":"zaid","year":"2021","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"ref14","author":"wang","year":"0","journal-title":"Enhancing the Performance of Practical Profiling SideChanel Attacks Using Conditional Generative Adversarial Networks"},{"key":"ref11","first-page":"209","article-title":"The curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-Channel Evaluations","volume":"1","author":"picek","year":"2019","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-019-00220-8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i4.27-56"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3033495"},{"key":"ref19","author":"kerkhof","year":"0","journal-title":"No (good) loss no gain Systematic evaluation of loss functions in deep learning-based side-channel analysis"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i2.107-131"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2021.3115420"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3072653"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0030-6"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i4.337-364"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218693"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/NORCHIP.2019.8906945"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1504\/IJACT.2014.062722"},{"key":"ref41","article-title":"Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines","author":"bartkewitz","year":"2012","journal-title":"Proc Conference on Smart Card Research and Advanced Applications (CARDIS)"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i3.677-707"},{"key":"ref43","article-title":"Kilroy Was Here: The First Step Towards Explainability of Neural Networks in Profiled side-channel Analysis","author":"van der valk","year":"2020","journal-title":"Constructive Side-Channel Analysis and Secure Design"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88238-9_11"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966373"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49445-6_1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_27"},{"key":"ref3","article-title":"Correlation Power Analysis with a Leakage Model","author":"brier","year":"2004","journal-title":"Proc of CHES'04"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-014-0089-3"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0023-x"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3517810"},{"key":"ref35","year":"0"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354217"},{"key":"ref37","article-title":"NICV: Normalized inter-class variance for detection of side-channel leakage","author":"bhasin","year":"2014","journal-title":"2014 International Symposium on Electromagnetic Compatibility"},{"key":"ref36","year":"0"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2926324"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586100"},{"key":"ref33","author":"picek","year":"0","journal-title":"Sok Deep Learningbased Physical Side-channel Analysis"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317934"},{"key":"ref2","article-title":"Template Attacks","author":"chari","year":"2022","journal-title":"Proceedings of Cryptographic Hardware and Embedded Systems (CHES 2000)"},{"key":"ref1","article-title":"Differential Power Analysis","author":"kocher","year":"1999","journal-title":"Proc of CRYPTO'99"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-019-00212-8"},{"key":"ref38","author":"immler","year":"0","journal-title":"Your Rails Cannot Hide From Localized EM How Dual-Rail Logic Fails on FPGAs"},{"key":"ref24","year":"0"},{"key":"ref23","article-title":"Partition v.s. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices","author":"standaert","year":"2008","journal-title":"Information Security and Cryptology - ICISC 2008"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-24261-3_7","article-title":"Deep Metric Learning Using Triplet Network","author":"hoffer","year":"2015","journal-title":"International Workshop on Similarity-Based Pattern Recognition"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i3.413-437"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST53231.2021.9699481"},{"key":"ref21","year":"0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3465380"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24390"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51938-4_17"}],"event":{"name":"2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","location":"San Jose, CA, USA","start":{"date-parts":[[2023,5,1]]},"end":{"date-parts":[[2023,5,4]]}},"container-title":["2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10132842\/10132914\/10133495.pdf?arnumber=10133495","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T17:56:09Z","timestamp":1686592569000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10133495\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,1]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/host55118.2023.10133495","relation":{},"subject":[],"published":{"date-parts":[[2023,5,1]]}}}