{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:08:43Z","timestamp":1755907723388,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,18]],"date-time":"2023-11-18T00:00:00Z","timestamp":1700265600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,18]]},"DOI":"10.1145\/3603273.3630505","type":"proceedings-article","created":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T18:12:40Z","timestamp":1704823960000},"page":"33-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Side-Channel Attacks Based on Deep Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-1360-6295","authenticated-orcid":false,"given":"Changliang","family":"Luo","sequence":"first","affiliation":[{"name":"State Key Laboratory of Vehicle NVH and Safety Technology, China and \rChina Automotive Engineering Research Institute Co Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-9124-0221","authenticated-orcid":false,"given":"Zhao","family":"Wen","sequence":"additional","affiliation":[{"name":"School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1800-1886","authenticated-orcid":false,"given":"Lei","family":"Gao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Vehicle NVH and Safety Technology, China and \rChina Automotive Engineering Research Institute Co Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7208-1204","authenticated-orcid":false,"given":"Xiaotong","family":"Cui","sequence":"additional","affiliation":[{"name":"School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, China"}]}],"member":"320","published-online":{"date-parts":[[2024,1,9]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"35","volume-title":"Dubroval E. 2020 Far Field EM Side-channel Attack on AES Using Deep Learning. Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security","author":"Wang R","unstructured":"Wang R, Wang H, Dubroval E. 2020 Far Field EM Side-channel Attack on AES Using Deep Learning. Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security, Orlando, USA, pp. 35-44."},{"key":"e_1_3_2_1_2_1","first-page":"45","volume-title":"Taiwan, China","author":"Cagli E","unstructured":"Cagli E, Dumas C, Prouff E. 2017 Convolutional Neural Networks with Data Augmentation Against Jitter-based Countermeasures: Profiling Attacks without Pre-processing. Cryptographic Hardware and Embedded Systems\u2013CHES 2017: 19th International Conference, Taiwan, China, pp. 45-68."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2022.3218372"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i3.552-598"},{"issue":"1","key":"e_1_3_2_1_5_1","first-page":"1","article-title":"The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations","volume":"2019","author":"Picek S","year":"2019","unstructured":"Picek S, Heuser a, Jovic A, 2019 The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations. IACR Transactions on Cryptographic Hardware and Embedded Systems 2019(1): 1-29.","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1352-2310(97)00447-0"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.10.013"}],"event":{"name":"AAIA 2023: 2023 International Conference on Advances in Artificial Intelligence and Applications","acronym":"AAIA 2023","location":"Wuhan China"},"container-title":["Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603273.3630505","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603273.3630505","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:34:04Z","timestamp":1755891244000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603273.3630505"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,18]]},"references-count":7,"alternative-id":["10.1145\/3603273.3630505","10.1145\/3603273"],"URL":"https:\/\/doi.org\/10.1145\/3603273.3630505","relation":{},"subject":[],"published":{"date-parts":[[2023,11,18]]},"assertion":[{"value":"2024-01-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}