{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:58:24Z","timestamp":1772063904326,"version":"3.50.1"},"reference-count":37,"publisher":"Zhejiang University Press","issue":"4","license":[{"start":{"date-parts":[[2017,4,1]],"date-time":"2017-04-01T00:00:00Z","timestamp":1491004800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Frontiers Inf Technol Electronic Eng"],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1631\/fitee.1500460","type":"journal-article","created":{"date-parts":[[2017,4,17]],"date-time":"2017-04-17T19:48:05Z","timestamp":1492458485000},"page":"511-518","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Side-channel attacks and learning-vector quantization"],"prefix":"10.1631","volume":"18","author":[{"given":"Ehsan","family":"Saeedi","sequence":"first","affiliation":[]},{"given":"Yinan","family":"Kong","sequence":"additional","affiliation":[]},{"given":"Md. Selim","family":"Hossain","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2017,4,19]]},"reference":[{"key":"ref1","first-page":"263","volume":"7771","author":"Bartkewitz","year":"2013","journal-title":"Efficient template attacks based on probabilistic multi-class support vector machines."},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781107360211","volume-title":"Elliptic Curves in Cryptography.","author":"Blake","year":"1999"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/bf02551274"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/eurcon.2005.1630348"},{"key":"ref5","volume-title":"Pattern Classification.","author":"Duda","year":"2011"},{"issue":"12","key":"ref6","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1515\/bmte.1992.37.12.303","article-title":"EEG classification by learning vector quantization","volume":"31","author":"Flotzinger","year":"1992","journal-title":"Biomed. Eng."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/tit.1979.1056067"},{"key":"ref8","volume-title":"Neural Networks and Learning Machines.","author":"Haykin","year":"2009"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29912-4_18"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27954-6_15"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37288-9_17"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_11"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1090\/s0025-5718-1987-0866109-5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/0893-6080(88)90020-2"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ijcnn.1990.137622"},{"key":"ref17","first-page":"137","article-title":"Int. Joint Conf. on Neural Networks","author":"Kohonen","year":"1990b","journal-title":"Advanced Neural Computers."},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/csf.2009.21"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5755\/j01.itc.40.3.632"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28073-3_13"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2468"},{"key":"ref22","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards.","author":"Mangard","year":"2007"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.21437\/ICSLP.1992-120"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39799-x_31"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06320-1_11"},{"key":"ref26","first-page":"11","article-title":"Radar Classification of Sea-Ice Using Traditional and Neural Classifiers","volume-title":"Proc. Int. Joint Conf. on Neural Networks","author":"Orlando"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/0925-2312(94)00071-9"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-10175-0","volume-title":"Constructive Side-Channel Analysis and Secure Design.","author":"Prouff","year":"2014"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/icspcs.2014.7021075"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/spects.2015.7285297"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_15"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/s11427-015-4810-y","article-title":"Offline dictionary attack on pass-word authentication schemes using smart cards","author":"Wang","year":"2015","journal-title":"LNCS"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.8.1.148-155"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2014.2355850"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.03.070"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1631\/fitee.1400232"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/tit.1982.1056490"}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1631\/FITEE.1500460\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1500460.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1500460.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T06:35:40Z","timestamp":1771655740000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1631\/FITEE.1500460"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4]]},"references-count":37,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,4]]}},"alternative-id":["46"],"URL":"https:\/\/doi.org\/10.1631\/fitee.1500460","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4]]}}}