{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T06:52:01Z","timestamp":1767250321467,"version":"3.48.0"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100012226","name":"\u201cthe Fundamental Research Funds for the Central Universities\u201d","doi-asserted-by":"publisher","award":["3282025038"],"award-info":[{"award-number":["3282025038"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cogn. Commun. Netw."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tccn.2025.3626384","type":"journal-article","created":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T17:37:53Z","timestamp":1761673073000},"page":"3618-3630","source":"Crossref","is-referenced-by-count":0,"title":["Side-Channel Attacks on Protected Cryptographic Devices in Agentic AI: A Wavelet Scattering-Based Multi-Channel CNN Approach"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4668-9427","authenticated-orcid":false,"given":"Xiaoyi","family":"Duan","sequence":"first","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing, China"}]},{"given":"Shenghan","family":"Zhu","sequence":"additional","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-6023-5228","authenticated-orcid":false,"given":"Tong","family":"Jing","sequence":"additional","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing, China"}]},{"given":"Ding","family":"Ding","sequence":"additional","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2024.3459037"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2022.105548"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2023.3240707"},{"key":"ref4","article-title":"Towards robust and secure embodied AI: A survey on vulnerabilities and attacks","author":"Xing","year":"2025","journal-title":"arXiv:2502.13175"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44709-1_21"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0023-x"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37288-9_18"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1504\/IJACT.2014.062722"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2015.7296242"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49445-6_1"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i4.337-364"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i3.413-437"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48059-5_15"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_26"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176671"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-019-00220-8"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.13164\/re.2016.0365"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0006-y"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9084-8"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_3"},{"key":"ref23","first-page":"243","article-title":"Template attacks on masking: An interpretation","volume-title":"Proc. Western Eur. Workshop Res. Cryptol.","author":"Gierlichs"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103383"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i3.235-274"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31912-9_4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_3"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i3.148-179"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2020.i1.1-36"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2020.i3.147-168"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2023.i1.401-437"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37288-9_9"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys57074.2022.00131"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12041054"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68773-1_4"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_4"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MICROW.2012.15"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15462-2_1"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1002\/cpa.21413"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.230"},{"issue":"60","key":"ref41","first-page":"2256","article-title":"Kymatio: Scattering transforms in Python","volume":"21","author":"Andreux","year":"2020","journal-title":"J. Mach. Learn. Res."},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3390\/app132111942"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3390\/agriculture13030730"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i4.828-861"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2024.3401159"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_26"},{"key":"ref47","article-title":"An enhanced convolutional neural network in side-channel attacks and its visualization","author":"Jin","year":"2020","journal-title":"arXiv:2009.08898"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/tetc.2022.3218372"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2023.i2.310-357"}],"container-title":["IEEE Transactions on Cognitive Communications and Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6687307\/11304002\/11219066.pdf?arnumber=11219066","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T06:49:58Z","timestamp":1767250198000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11219066\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/tccn.2025.3626384","relation":{},"ISSN":["2332-7731","2372-2045"],"issn-type":[{"type":"electronic","value":"2332-7731"},{"type":"electronic","value":"2372-2045"}],"subject":[],"published":{"date-parts":[[2026]]}}}