{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:58:42Z","timestamp":1775667522860,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Netherlands Organization for Scientific Research NWO","award":["DISTANT CS.019"],"award-info":[{"award-number":["DISTANT CS.019"]}]},{"name":"NWA Cybersecurity Call","award":["PROACT NWA.1215.18.01"],"award-info":[{"award-number":["PROACT NWA.1215.18.01"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3605769.3623996","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T08:31:21Z","timestamp":1700728281000},"page":"73-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Beyond the Last Layer: Deep Feature Loss Functions in Side-channel Analysis"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8651-574X","authenticated-orcid":false,"given":"Trevor","family":"Yap","sequence":"first","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7509-4337","authenticated-orcid":false,"given":"Stjepan","family":"Picek","sequence":"additional","affiliation":[{"name":"Radboud University &amp; Delft University of Technology, Nijmegen and Delft , Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6903-5127","authenticated-orcid":false,"given":"Shivam","family":"Bhasin","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-019-00220--8"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_3"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.FIPS.197"},{"key":"e_1_3_2_1_4_1","volume-title":"Analyzing and Improving Representations with the Soft Nearest Neighbor Loss. arxiv","author":"Frosst Nicholas","year":"1902","unstructured":"Nicholas Frosst , Nicolas Papernot , and Geoffrey Hinton . 2019. Analyzing and Improving Representations with the Soft Nearest Neighbor Loss. arxiv : 1902 .01889 [stat.ML] Nicholas Frosst, Nicolas Papernot, and Geoffrey Hinton. 2019. Analyzing and Improving Representations with the Soft Nearest Neighbor Loss. arxiv: 1902.01889 [stat.ML]"},{"key":"e_1_3_2_1_5_1","volume-title":"Deep Learning","author":"Goodfellow Ian","unstructured":"Ian Goodfellow , Yoshua Bengio , and Aaron Courville . 2016. Deep Learning . MIT Press . http:\/\/www.deeplearningbook.org. Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep Learning. MIT Press. http:\/\/www.deeplearningbook.org."},{"key":"e_1_3_2_1_6_1","volume-title":"Constructive Side-Channel Analysis and Secure Design, Josep Balasch and Colin O'Flynn (Eds.)","author":"Kerkhof Maikel","unstructured":"Maikel Kerkhof , Lichao Wu , Guilherme Perin , and Stjepan Picek . 2022. Focus is Key to Success: A Focal Loss Function for Deep Learning-Based Side-Channel Analysis . In Constructive Side-Channel Analysis and Secure Design, Josep Balasch and Colin O'Flynn (Eds.) . Springer International Publishing , Cham , 29--48. Maikel Kerkhof, Lichao Wu, Guilherme Perin, and Stjepan Picek. 2022. Focus is Key to Success: A Focal Loss Function for Deep Learning-Based Side-Channel Analysis. In Constructive Side-Channel Analysis and Secure Design, Josep Balasch and Colin O'Flynn (Eds.). Springer International Publishing, Cham, 29--48."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-023-00320--6"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2017.2681128"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"e_1_3_2_1_10_1","volume-title":"A comprehensive study of deep learning for side-channel analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems","author":"Dumas C\u00e9cile","year":"2020","unstructured":"Lo\"ic Masure, C\u00e9cile Dumas , and Emmanuel Prouff . 2020. A comprehensive study of deep learning for side-channel analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems ( 2020 ), 348--375. Lo\"ic Masure, C\u00e9cile Dumas, and Emmanuel Prouff. 2020. A comprehensive study of deep learning for side-channel analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems (2020), 348--375."},{"key":"e_1_3_2_1_11_1","volume-title":"ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research. In International Workshop on Constructive Side-Channel Analysis and Secure Design.","author":"O'Flynn Colin","year":"2014","unstructured":"Colin O'Flynn and Zhizhang David Chen . 2014 . ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research. In International Workshop on Constructive Side-Channel Analysis and Secure Design. Colin O'Flynn and Zhizhang David Chen. 2014. ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research. In International Workshop on Constructive Side-Channel Analysis and Secure Design."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i4.828--861"},{"key":"e_1_3_2_1_13_1","unstructured":"Guilherme Perin Lichao Wu and Stjepan Picek. 2022b. I Know What Your Layers Did: Layer-wise Explainability of Deep Learning Side-channel Analysis. Cryptology ePrint Archive Paper 2022\/1087. https:\/\/eprint.iacr.org\/2022\/1087 https:\/\/eprint.iacr.org\/2022\/1087.  Guilherme Perin Lichao Wu and Stjepan Picek. 2022b. I Know What Your Layers Did: Layer-wise Explainability of Deep Learning Side-channel Analysis. Cryptology ePrint Archive Paper 2022\/1087. https:\/\/eprint.iacr.org\/2022\/1087 https:\/\/eprint.iacr.org\/2022\/1087."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2019.i1.209--237"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3569577"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i3.677--707"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the Eleventh International Conference on Artificial Intelligence and Statistics (Proceedings of Machine Learning Research","volume":"419","author":"Salakhutdinov Ruslan","year":"2007","unstructured":"Ruslan Salakhutdinov and Geoff Hinton . 2007 . Learning a Nonlinear Embedding by Preserving Class Neighbourhood Structure . In Proceedings of the Eleventh International Conference on Artificial Intelligence and Statistics (Proceedings of Machine Learning Research , Vol. 2), Marina Meila and Xiaotong Shen (Eds.). PMLR, San Juan, Puerto Rico, 412-- 419 . https:\/\/proceedings.mlr.press\/v2\/salakhutdinov07a.html Ruslan Salakhutdinov and Geoff Hinton. 2007. Learning a Nonlinear Embedding by Preserving Class Neighbourhood Structure. In Proceedings of the Eleventh International Conference on Artificial Intelligence and Statistics (Proceedings of Machine Learning Research, Vol. 2), Marina Meila and Xiaotong Shen (Eds.). PMLR, San Juan, Puerto Rico, 412--419. https:\/\/proceedings.mlr.press\/v2\/salakhutdinov07a.html"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46478-7_31"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2022.3218372"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i3.413--437"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101740"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i1.25--55"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2020.i1.1--36"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2020.i3.73--96"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605769.3623996","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605769.3623996","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:12Z","timestamp":1750178772000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605769.3623996"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":24,"alternative-id":["10.1145\/3605769.3623996","10.1145\/3605769"],"URL":"https:\/\/doi.org\/10.1145\/3605769.3623996","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}