{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T22:22:31Z","timestamp":1730240551650,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,24]],"date-time":"2022-10-24T00:00:00Z","timestamp":1666569600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,24]],"date-time":"2022-10-24T00:00:00Z","timestamp":1666569600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,24]]},"DOI":"10.1109\/icecs202256217.2022.9971033","type":"proceedings-article","created":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T14:50:02Z","timestamp":1670856602000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Pruning-based Neural Network Reduction for Faster Profiling Side-Channel Attacks"],"prefix":"10.1109","author":[{"given":"Rodrigo","family":"Lellis","sequence":"first","affiliation":[{"name":"Federal University of Pelotas (UFPel),Graduate Program on Computing (PPGC),Pelotas\/RS,Brazil"}]},{"given":"Rafael","family":"Soares","sequence":"additional","affiliation":[{"name":"Federal University of Pelotas (UFPel),Graduate Program on Computing (PPGC),Pelotas\/RS,Brazil"}]},{"given":"Guilherme","family":"Perin","sequence":"additional","affiliation":[{"name":"Institute for Computing and Information Sciences, Radboud University,Nijmegen,Netherland"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i3.235-274"},{"key":"ref11","first-page":"1","article-title":"Non-profiled deep learning-based side-channel attacks","author":"timon","year":"2018","journal-title":"Cryptology ePrint Archive"},{"key":"ref12","article-title":"Learning both weights and connections for efficient neural network","volume":"28","author":"han","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref13","article-title":"Dynamic network surgery for efficient dnns","volume":"29","author":"guo","year":"2016","journal-title":"Advances in neural information processing systems"},{"key":"ref14","article-title":"Network trimming: A data-driven neuron pruning approach towards efficient deep architectures","volume":"abs 1607 3250","author":"hu","year":"2016","journal-title":"CoRR"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2979517"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3508546.3508568"},{"key":"ref17","first-page":"717","article-title":"Explain some noise: Ablation analysis for deep learning-based physical side-channel analysis","author":"wu","year":"2021","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref18","article-title":"The lottery ticket hypothesis: Training pruned neural networks","volume":"abs 1803 3635","author":"frankle","year":"2018","journal-title":"CoRR"},{"journal-title":"Python Reference Manual","year":"2009","author":"van rossum","key":"ref19"},{"key":"ref4","first-page":"53","article-title":"Study of deep learning techniques for side-channel analysis and introduction to ascad database","author":"benadjila","year":"2018","journal-title":"IACR Cryptology"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-019-00209-3"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i3.148-179"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i3.147-168"},{"key":"ref7","first-page":"1","article-title":"Methodology for Efficient CNN Architectures in Profiling Attacks","volume":"2020","author":"zaid","year":"2020","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_3"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i3.677-707"},{"journal-title":"Keras","year":"2015","author":"chollet","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_26"}],"event":{"name":"2022 29th IEEE International Conference on Electronics, Circuits and Systems (ICECS)","start":{"date-parts":[[2022,10,24]]},"location":"Glasgow, United Kingdom","end":{"date-parts":[[2022,10,26]]}},"container-title":["2022 29th IEEE International Conference on Electronics, Circuits and Systems (ICECS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9970762\/9970770\/09971033.pdf?arnumber=9971033","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T15:00:49Z","timestamp":1674486049000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9971033\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,24]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icecs202256217.2022.9971033","relation":{},"subject":[],"published":{"date-parts":[[2022,10,24]]}}}