{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:08:39Z","timestamp":1755907719666,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,18]],"date-time":"2023-11-18T00:00:00Z","timestamp":1700265600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,18]]},"DOI":"10.1145\/3603273.3630503","type":"proceedings-article","created":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T18:12:40Z","timestamp":1704823960000},"page":"349-353","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Power Analysis Attack Based on Hybrid Denoising"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-4441-4840","authenticated-orcid":false,"given":"Peng","family":"He","sequence":"first","affiliation":[{"name":"State Key Laboratory of Vehicle NVH and Safety Technology, China and \rChina Automotive Engineering Research Institute Co Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6440-7332","authenticated-orcid":false,"given":"Qin","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Chongqing University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3461-4161","authenticated-orcid":false,"given":"Heng","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Vehicle NVH and Safety Technology, China and \rChina Automotive Engineering Research Institute Co Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7208-1204","authenticated-orcid":false,"given":"Xiaotong","family":"Cui","sequence":"additional","affiliation":[{"name":"School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Chongqing University of Posts and Telecommunications, China"}]}],"member":"320","published-online":{"date-parts":[[2024,1,9]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"121","volume-title":"Oscar N 2017 Security Smells in Android. 2017 IEEE 17th International Working Conference on Source Code Analysis and Manipulation","author":"Mohammad G","unstructured":"Mohammad G, Pascal G, Oscar N 2017 Security Smells in Android. 2017 IEEE 17th International Working Conference on Source Code Analysis and Manipulation, Shanghai, China pp. 121-130."},{"issue":"2","key":"e_1_3_2_1_2_1","first-page":"21821","article-title":"Selective encryption of the versatile video coding standard","volume":"10","author":"Gautier G","year":"2021","unstructured":"Gautier G, Farajallah M, Hamidouche W, 2021 Selective encryption of the versatile video coding standard. IEEE Access 10(2): 21821-21835.","journal-title":"IEEE Access"},{"volume-title":"Automation & Test in Europe Conference & Exhibition (DATE) 2020 Mar 9 (pp. 1007-1010)","author":"Glamo\u010danin O","key":"e_1_3_2_1_3_1","unstructured":"Glamo\u010danin O, Coulon L, Regazzoni F, Stojilovi\u0107 M. Are cloud FPGAs really vulnerable to power analysis attacks? In2020 Design, Automation & Test in Europe Conference & Exhibition (DATE) 2020 Mar 9 (pp. 1007-1010). IEEE."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3144871"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3139268"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.023516"},{"volume-title":"InProceedings of the 9th International Conference on Computer Engineering and Networks 2021 (pp. 565-574)","author":"Zhang J","key":"e_1_3_2_1_7_1","unstructured":"Zhang J, Li L, Li Q, Zhao J, Liang X. Power analysis attack on a lightweight block cipher GIFT. InProceedings of the 9th International Conference on Computer Engineering and Networks 2021 (pp. 565-574). Springer Singapore."},{"volume-title":"Automation & Test in Europe Conference & Exhibition (DATE) 2022 Mar 14 (pp. 1263-1268)","author":"Bahrami J","key":"e_1_3_2_1_8_1","unstructured":"Bahrami J, Ebrahimabadi M, Danger JL, Guilley S, Karimi N. Leakage power analysis in different S-box masking protection schemes. In2022 Design, Automation & Test in Europe Conference & Exhibition (DATE) 2022 Mar 14 (pp. 1263-1268). IEEE."},{"key":"e_1_3_2_1_9_1","first-page":"1192","volume-title":"Electronic and Automation Control Conference (IMCEC)","author":"Cheng K","year":"2021","unstructured":"Cheng K, Song Z, Cui X, 2021 Hybrid Denoising Based Correlation Power Analysis for AES. 2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), Chongqing, China, pp. 1192-1195."}],"event":{"name":"AAIA 2023: 2023 International Conference on Advances in Artificial Intelligence and Applications","acronym":"AAIA 2023","location":"Wuhan China"},"container-title":["Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603273.3630503","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603273.3630503","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:34:12Z","timestamp":1755891252000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603273.3630503"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,18]]},"references-count":9,"alternative-id":["10.1145\/3603273.3630503","10.1145\/3603273"],"URL":"https:\/\/doi.org\/10.1145\/3603273.3630503","relation":{},"subject":[],"published":{"date-parts":[[2023,11,18]]},"assertion":[{"value":"2024-01-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}