{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:44:10Z","timestamp":1763102650565,"version":"3.45.0"},"reference-count":35,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":88,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.060925","type":"journal-article","created":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T03:00:41Z","timestamp":1739329241000},"page":"1001-1022","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Stacked Network Method for Enhancing the Performance of Side-Channel Attacks"],"prefix":"10.32604","volume":"83","author":[{"given":"Zhicheng","family":"Yin","sequence":"first","affiliation":[]},{"given":"Lang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Ou","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"Selected Areas in Cryptography-29th International Conference, SAC 2022","first-page":"3","article-title":"Profiling side-channel attacks on dilithium\u2014A small bit-fiddling leak breaks it all","volume":"13742","author":"Ulitzsch","year":"2022"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1109\/TETC.2022.3218372","article-title":"I choose you: automated hyperparameter tuning for deep learning-based side-channel analysis","volume":"12","author":"Wu","year":"2024","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"ref3","first-page":"100","article-title":"A nonprofiled side-channel analysis based on variational lower bound related to mutual information","volume":"66","author":"Zhang","year":"2023","journal-title":"Sci China Inf Sci"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"107","DOI":"10.46586\/tches.v2019.i2.107-131","article-title":"Non-profiled deep learning-based side-channel attacks with sensitivity analysis","volume":"2019","author":"Timon","year":"2019","journal-title":"IACR Trans Cryptogr Hardw Embed Syst"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"3173","DOI":"10.1109\/TCSVT.2023.3234266","article-title":"Only once attack: fooling the tracker with adversarial template","volume":"33","author":"Zhou","year":"2023","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref6","first-page":"475","article-title":"Simple power analysis attacks using data with a single trace and no training","volume":"589","author":"Hu","year":"2024","journal-title":"IACR Cryptol EPrint Arch"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1109\/TPS.2018.2874955","article-title":"Design and electromagnetic analysis of an induction-type coilgun system with a pulse power module","volume":"47","author":"Go","year":"2018","journal-title":"IEEE Trans Plasma Sci"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/s13389-014-0089-3","article-title":"A machine learning approach against a masked AES: reaching the limit of side-channel attacks with a learning","volume":"5","author":"Lerman","year":"2015","journal-title":"J Cryptographic Eng"},{"key":"ref9","series-title":"Security, Privacy, and Applied Cryptography Engineering: 6th International Conference, SPACE 2016,","first-page":"3","article-title":"Breaking cryptographic implementations using deep learning techniques","author":"Maghrebi","year":"2016 Dec 14\u201318"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"513","DOI":"10.3390\/sym15020513","article-title":"Quality of service (QoS) performance analysis in a traffic engineering model for next-generation wireless sensor networks","volume":"15","author":"Mazhar","year":"2023","journal-title":"Symmetry"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"336","DOI":"10.46586\/tches.v2024.i1.336-374","article-title":"EstraNet: an efficient shift-invariant transformer network for side-channel analysis","volume":"2024","author":"Hajra","year":"2024","journal-title":"IACR Trans Cryptogr Hardw Embed Syst"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"49","DOI":"10.46586\/tches.v2020.i4.49-85","article-title":"Plaintext: a missing feature for enhancing the power of deep learning in side-channel analysis? breaking multiple layers of side-channel countermeasures","volume":"2020","author":"Hoang","year":"2020","journal-title":"IACR Trans Cryptogr Hardw Embed Syst"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"413","DOI":"10.46586\/tches.v2022.i3.413-437","article-title":"The best of two worlds: deep learning-assisted template attack","volume":"2022","author":"Wu","year":"2022","journal-title":"IACR Trans Cryptogr Hardw Embed Syst"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"828","DOI":"10.46586\/tches.v2022.i4.828-861","article-title":"Exploring feature selection scenarios for deep learning-based side-channel analysis","volume":"2022","author":"Perin","year":"2022","journal-title":"IACR Trans Cryptogr Hardw Embed Syst"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3569577","article-title":"SoK: deep learning-based physical side-channel analysis","volume":"55","author":"Picek","year":"2023","journal-title":"ACM Comput Surv"},{"key":"ref16","series-title":"Constructive Side-Channel Analysis and Secure Design\u201312th International Workshop, COSADE 2021; Lugano, Switzerland","first-page":"53","article-title":"Learning when to stop: a mutual information approach to prevent overfitting in profiled side-channel analysis","volume":"12910","author":"Perin","year":"2021"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"73","DOI":"10.46586\/tches.v2020.i3.73-96","article-title":"A novel evaluation metric for deep learning-based side channel analysis and its extended application to imbalanced data","volume":"2020","author":"Zhang","year":"2020","journal-title":"IACR Trans Cryptogr Hardw Embed Syst"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"235","DOI":"10.46586\/tches.v2021.i3.235-274","article-title":"Pay attention to raw traces: a deep learning architecture for end-to-end profiling attacks","volume":"2021","author":"Lu","year":"2021","journal-title":"IACR Trans Cryptogr Hardw Embed Syst"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"337","DOI":"10.46586\/tches.v2020.i4.337-364","article-title":"Strength in numbers: improving generalization with ensembles in machine learning-based profiled side-channel analysis","volume":"2020","author":"Perin","year":"2020","journal-title":"IACR Trans Cryptogr Hardw Embed Syst"},{"key":"ref20","series-title":"E-Business and Telecommunications\u201319th International Conference, ICSBT 2022","first-page":"43","article-title":"Stacked ensemble models evaluation on DL based SCA","volume":"1849","author":"Hoang","year":"2022"},{"key":"ref21","series-title":"Advances in Neural Information Processing Systems 29: Annual Conference on Neural\n\nInformation Processing Systems 2016","first-page":"109","article-title":"Incremental boosting convolutional neural network for facial action unit recognition","author":"Han","year":"2016"},{"key":"ref22","series-title":"11th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2020","first-page":"1","article-title":"A comparative analysis for machine learning based software defect prediction systems","author":"Cetiner","year":"2020 Jul 1\u20133"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"8249","DOI":"10.1007\/s00521-020-04960-1","article-title":"Software defect prediction model based on LASSO-SVM","volume":"33","author":"Wang","year":"2021","journal-title":"Neural Comput Appl"},{"key":"ref24","series-title":"Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2016","first-page":"1","article-title":"Deep networks with stochastic depth for acoustic modelling","author":"Chen","year":"2016 Dec 13\u201316"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"20376","DOI":"10.1109\/ACCESS.2024.3358201","article-title":"Software defect prediction using an intelligent ensemble-based model","volume":"12","author":"Ali","year":"2024","journal-title":"IEEE Access"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"10551","DOI":"10.1007\/s00521-021-05811-3","article-title":"Improved prediction of software defects using ensemble machine learning techniques","volume":"33","author":"Mehta","year":"2021","journal-title":"Neural Comput Appl"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/s13389-019-00220-8","article-title":"Deep learning for side-channel analysis and introduction to ASCAD database","volume":"10","author":"Benadjila","year":"2020","journal-title":"J Cryptogr Eng"},{"key":"ref28","series-title":"38th Conference on Design of Circuits and Integrated Systems, DCIS 2023","first-page":"1","article-title":"A security comparison between AES-128 and AES-256 FPGA implementations against DPA attacks","author":"Gonz\u00e1lez","year":"2023 Nov 15\u201317"},{"key":"ref29","series-title":"Progress in Cryptology\u2013AFRICACRYPT 2022: 13th International Conference on Cryptology in Africa, AFRICACRYPT 2022","first-page":"371","article-title":"Transnet: shift invariant trans-former network for side channel analysis","volume":"13503","author":"Hajra"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"3199","DOI":"10.1007\/s13042-022-01588-6","article-title":"ESRM: an efficient regression model based on random kernels for side channel analysis","volume":"13","author":"Ou","year":"2022","journal-title":"Int J Mach Learn Cybern"},{"key":"ref31","first-page":"1","article-title":"Methodology for efficient CNN architectures in profiling attacks","volume":"2020","author":"Zaid","year":"2020","journal-title":"IACR Transact Crypt Hardw Embed Syst"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"677","DOI":"10.46586\/tches.v2021.i3.677-707","article-title":"Reinforcement learning for hyperparameter tuning in deep learning-basedside-channel analysis","volume":"2021","author":"Rijsdijk","year":"2021","journal-title":"IACR Trans Cryptogr Hardw Embed Syst"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"147","DOI":"10.46586\/tches.v2020.i3.147-168","article-title":"Revisiting a methodology for efficient CNN architectures in profiling attacks","volume":"2020","author":"Wouters","year":"2020","journal-title":"IACR Trans Cryptogr Hardw Embed Syst"},{"key":"ref34","series-title":"Smart Card Research and Advanced Applications\u201322nd International Conference, CARDIS 2023","first-page":"235","article-title":"Deep stacking ensemble learning applied to profiling side-channel attacks","volume":"14530","author":"Llavata","year":"2023"},{"key":"ref35","first-page":"209","article-title":"The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations","volume":"2019","author":"Picek","year":"2019","journal-title":"IACR Trans Cryptogr Hardw Embed Syst"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-1\/TSP_CMC_60925\/TSP_CMC_60925.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:39:13Z","timestamp":1763102353000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n1\/60107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":35,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.060925","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-11-12","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-06","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-26","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}