{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T15:15:35Z","timestamp":1777043735554,"version":"3.51.4"},"reference-count":49,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2150086"],"award-info":[{"award-number":["CNS-2150086"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,6]]},"DOI":"10.1109\/host55342.2024.10545382","type":"proceedings-article","created":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T17:21:52Z","timestamp":1717694512000},"page":"320-331","source":"Crossref","is-referenced-by-count":12,"title":["TinyPower: Side-Channel Attacks with Tiny Neural Networks"],"prefix":"10.1109","author":[{"given":"Haipeng","family":"Li","sequence":"first","affiliation":[{"name":"University of Cincinnati"}]},{"given":"Mabon","family":"Ninan","sequence":"additional","affiliation":[{"name":"University of Cincinnati"}]},{"given":"Boyang","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Cincinnati"}]},{"given":"John M.","family":"Emmert","sequence":"additional","affiliation":[{"name":"University of Cincinnati"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49445-6_1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-019-00220-8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3569577"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3517810"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_3"},{"key":"ref6","article-title":"Optimal Brain Damage","author":"LeCun","year":"1990","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref7","article-title":"What is the State of Neural Network Pruning?","volume-title":"Proc. of the 3rd MLSys Conference","author":"Blalock","year":"2020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.07.045"},{"key":"ref9","article-title":"Pruning filters for efficient convnets","volume-title":"Proceedings of International Conference on Learning Representations (ICLR)","author":"Li","year":"2017"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00447"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i3.677-707"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-97087-1_9"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24390"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3465380"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1145\/3316781.3317934","article-title":"X-DeepSCA: Cross-Device Deep Learning Side Channel Attack","volume-title":"Proc. of 56th ACMI\/EEE Design Automation Conference (DAC19)","author":"Das","year":"2019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2926324"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51938-4_17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586100"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/HOST55118.2023.10133491"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3558482.3590177"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3565571"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-29497-6_6"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"ref25","article-title":"NICV: Normalized inter-class variance for detection of side-channel leakage","volume-title":"2014 International Symposium on Electromagnetic Compatibility","author":"Bhasin","year":"2014"},{"key":"ref26","article-title":"The lottery ticket hypothesis: Finding sparse, trainable neural networks","volume-title":"Proceedings of International Conference on Learning Representations (ICLR)","author":"Frankle","year":"2019"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_3"},{"key":"ref28","volume-title":"Autoencoder-enabled Model Portability for Reducing Hyperparameter Tuning Efforts in Side-channel Analysis","author":"Krcek"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68773-1_9"},{"key":"ref30","volume-title":"Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis","author":"Yap"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/HOST55118.2023.10133495"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i1.25-55"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i3.413-437"},{"key":"ref34","volume-title":"OccPoIs: Points of Interest based on Neural Networks Key Recovery in Side-Channel Analysis through Occlusion","author":"Yap"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i4.828-861"},{"key":"ref36","volume-title":"Breaking Free: Leakage Model-free Deep Learning-based Side-channel Analysis","author":"Wu"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i1.209-237"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2019.i2.107-131"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3072653"},{"key":"ref40","volume-title":"An End-to-end Plaintext-based Side-channel Collision Attack without Trace Segmentation","author":"Wu"},{"key":"ref41","volume-title":"Hiding in Plain Sight: Non-profiling Deep Learning-based Side-channel Analysis with Plantext\/Ciphertext","author":"Wu"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/HOST49136.2021.9702270"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i1.1-36"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i3.147-168"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/tetc.2022.3218372"},{"key":"ref46","article-title":"Rethinking the value of network pruning","volume-title":"Proceedings of International Conference on Learning Representations (ICLR)","author":"Liu","year":"2019"},{"key":"ref47","volume-title":"A Survey of Model Compression and Acceleration for Deep Neural Networks","author":"Cheng"},{"key":"ref48","volume-title":"A Survey on Methods and Theories of Quantized Neural Networks","author":"Guo"},{"key":"ref49","volume-title":"Knowledge Distillation: A Survey","author":"Gou"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638949"}],"event":{"name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","location":"Tysons Corner, VA, USA","start":{"date-parts":[[2024,5,6]]},"end":{"date-parts":[[2024,5,9]]}},"container-title":["2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10545333\/10545347\/10545382.pdf?arnumber=10545382","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T18:29:11Z","timestamp":1719340151000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10545382\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/host55342.2024.10545382","relation":{},"subject":[],"published":{"date-parts":[[2024,5,6]]}}}