{"id":"https://openalex.org/W4400810241","doi":"https://doi.org/10.1109/access.2024.3431218","title":"Review on Hybrid Deep Learning Models for Enhancing Encryption Techniques Against Side Channel Attacks","display_name":"Review on Hybrid Deep Learning Models for Enhancing Encryption Techniques Against Side Channel Attacks","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4400810241","doi":"https://doi.org/10.1109/access.2024.3431218"},"language":"en","primary_location":{"id":"doi:10.1109/access.2024.3431218","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3431218","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2024.3431218","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002040454","display_name":"Amjed Abbas Ahmed","orcid":"https://orcid.org/0000-0001-6069-2967"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Amjed A. Ahmed","raw_affiliation_strings":["Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Malaysia","Faculty of Information Science and Technology, Center for Cyber Security, Universiti Kebangsaan Malaysia (UKM), Bangi, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Malaysia","institution_ids":["https://openalex.org/I885383172"]},{"raw_affiliation_string":"Faculty of Information Science and Technology, Center for Cyber Security, Universiti Kebangsaan Malaysia (UKM), Bangi, Malaysia","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084720361","display_name":"Mohammad Kamrul Hasan","orcid":"https://orcid.org/0000-0001-5511-0205"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Mohammad Kamrul Hasan","raw_affiliation_strings":["Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Malaysia","Faculty of Information Science and Technology, Center for Cyber Security, Universiti Kebangsaan Malaysia (UKM), Bangi, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Malaysia","institution_ids":["https://openalex.org/I885383172"]},{"raw_affiliation_string":"Faculty of Information Science and Technology, Center for Cyber Security, Universiti Kebangsaan Malaysia (UKM), Bangi, Malaysia","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073112703","display_name":"Azana Hafizah Mohd Aman","orcid":"https://orcid.org/0000-0001-7337-6736"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Azana H. Aman","raw_affiliation_strings":["Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Malaysia","Faculty of Information Science and Technology, Center for Cyber Security, Universiti Kebangsaan Malaysia (UKM), Bangi, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Malaysia","institution_ids":["https://openalex.org/I885383172"]},{"raw_affiliation_string":"Faculty of Information Science and Technology, Center for Cyber Security, Universiti Kebangsaan Malaysia (UKM), Bangi, Malaysia","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110139061","display_name":"Nurhizam Safie","orcid":null},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Nurhizam Safie","raw_affiliation_strings":["Research Center for Software Technology and Management (SOFTAM), Faculty of Information Science and Technology (FTSM), Universiti Kebangsaan Malaysia, Bangi, Malaysia","Faculty of Information Science and Technology (FTSM), Research Center for Software Technology and Management (SOFTAM), Universiti Kebangsaan, Malaysia"],"affiliations":[{"raw_affiliation_string":"Research Center for Software Technology and Management (SOFTAM), Faculty of Information Science and Technology (FTSM), Universiti Kebangsaan Malaysia, Bangi, Malaysia","institution_ids":["https://openalex.org/I885383172"]},{"raw_affiliation_string":"Faculty of Information Science and Technology (FTSM), Research Center for Software Technology and Management (SOFTAM), Universiti Kebangsaan, Malaysia","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101532570","display_name":"Shayla Islam","orcid":"https://orcid.org/0000-0002-0490-7799"},"institutions":[{"id":"https://openalex.org/I55285296","display_name":"UCSI University","ror":"https://ror.org/019787q29","country_code":"MY","type":"education","lineage":["https://openalex.org/I55285296"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Shayla Islam","raw_affiliation_strings":["Institute of Computer Science and Digital Innovation, UCSI University, Kuala Lumpur, Malaysia","Institute of Computer Science and Digital Innovation, UCSI University, Malaysia"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Science and Digital Innovation, UCSI University, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I55285296"]},{"raw_affiliation_string":"Institute of Computer Science and Digital Innovation, UCSI University, Malaysia","institution_ids":["https://openalex.org/I55285296"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021942199","display_name":"Fatima Rayan Awad Ahmed","orcid":"https://orcid.org/0000-0001-8642-0791"},"institutions":[{"id":"https://openalex.org/I142608572","display_name":"Prince Sattam Bin Abdulaziz University","ror":"https://ror.org/04jt46d36","country_code":"SA","type":"education","lineage":["https://openalex.org/I142608572"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Fatima A. Ahmed","raw_affiliation_strings":["Computer Science Department, College of Computer Engineering and Science, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, College of Computer Engineering and Science, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia","institution_ids":["https://openalex.org/I142608572"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076401819","display_name":"Thowiba E. Ahmed","orcid":"https://orcid.org/0000-0002-3738-6731"},"institutions":[{"id":"https://openalex.org/I76571253","display_name":"Imam Abdulrahman Bin Faisal University","ror":"https://ror.org/038cy8j79","country_code":"SA","type":"education","lineage":["https://openalex.org/I76571253"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Thowiba E. Ahmed","raw_affiliation_strings":["Computer Science Department, College of Science and Humanities-Jubail, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia","School Computer Science Department, College of Science and Humanities-Jubail, Imam Abdulrahman Bin Faisal University, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, College of Science and Humanities-Jubail, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia","institution_ids":["https://openalex.org/I76571253"]},{"raw_affiliation_string":"School Computer Science Department, College of Science and Humanities-Jubail, Imam Abdulrahman Bin Faisal University, Saudi Arabia","institution_ids":["https://openalex.org/I76571253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041307546","display_name":"Bishwajeet Pandey","orcid":"https://orcid.org/0000-0001-5593-8985"},"institutions":[{"id":"https://openalex.org/I4210141757","display_name":"Astana Medical University","ror":"https://ror.org/038mavt60","country_code":"KZ","type":"education","lineage":["https://openalex.org/I4210141757"]}],"countries":["KZ"],"is_corresponding":false,"raw_author_name":"Bishwajeet Pandey","raw_affiliation_strings":["Department of Intelligent System and Cyber Security, Astana IT University, Astana, Kazakhstan","Department of Intelligent System and Cyber Security, Astana IT University, Kazakhstan"],"affiliations":[{"raw_affiliation_string":"Department of Intelligent System and Cyber Security, Astana IT University, Astana, Kazakhstan","institution_ids":["https://openalex.org/I4210141757"]},{"raw_affiliation_string":"Department of Intelligent System and Cyber Security, Astana IT University, Kazakhstan","institution_ids":["https://openalex.org/I4210141757"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073556511","display_name":"Leila Rzayeva","orcid":"https://orcid.org/0000-0002-3382-4685"},"institutions":[{"id":"https://openalex.org/I4210141757","display_name":"Astana Medical University","ror":"https://ror.org/038mavt60","country_code":"KZ","type":"education","lineage":["https://openalex.org/I4210141757"]}],"countries":["KZ"],"is_corresponding":false,"raw_author_name":"Leila Rzayeva","raw_affiliation_strings":["Department of Intelligent System and Cyber Security, Astana IT University, Astana, Kazakhstan","Department of Intelligent System and Cyber Security, Astana IT University, Kazakhstan"],"affiliations":[{"raw_affiliation_string":"Department of Intelligent System and Cyber Security, Astana IT University, Astana, Kazakhstan","institution_ids":["https://openalex.org/I4210141757"]},{"raw_affiliation_string":"Department of Intelligent System and Cyber Security, Astana IT University, Kazakhstan","institution_ids":["https://openalex.org/I4210141757"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5002040454"],"corresponding_institution_ids":["https://openalex.org/I885383172"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":6.4886,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.97085441,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"12","issue":null,"first_page":"188435","last_page":"188453"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9710000157356262,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9670000076293945,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8490779399871826},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7956913709640503},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.7180297374725342},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.6805595755577087},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5519617199897766},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5434600710868835},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5144277215003967},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4601048231124878},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.38704735040664673},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3835953176021576},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3479650020599365},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2990548312664032}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8490779399871826},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7956913709640503},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.7180297374725342},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.6805595755577087},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5519617199897766},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5434600710868835},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5144277215003967},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4601048231124878},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.38704735040664673},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3835953176021576},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3479650020599365},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2990548312664032}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2024.3431218","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3431218","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:4ebf788de5554b62b692e5d2dda12072","is_oa":true,"landing_page_url":"https://doaj.org/article/4ebf788de5554b62b692e5d2dda12072","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 12, Pp 188435-188453 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2024.3431218","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3431218","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2257513708","display_name":null,"funder_award_id":"GUP?2023-010","funder_id":"https://openalex.org/F4320322699","funder_display_name":"Universiti Kebangsaan Malaysia"},{"id":"https://openalex.org/G3843901600","display_name":null,"funder_award_id":"GUP 2023-010","funder_id":"https://openalex.org/F4320322699","funder_display_name":"Universiti Kebangsaan Malaysia"}],"funders":[{"id":"https://openalex.org/F4320322699","display_name":"Universiti Kebangsaan Malaysia","ror":"https://ror.org/00bw8d226"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":75,"referenced_works":["https://openalex.org/W1613874182","https://openalex.org/W2911054806","https://openalex.org/W2921829440","https://openalex.org/W2947103291","https://openalex.org/W2947331147","https://openalex.org/W2954035222","https://openalex.org/W2955091835","https://openalex.org/W2980498517","https://openalex.org/W2989659803","https://openalex.org/W2989660162","https://openalex.org/W2993973109","https://openalex.org/W3004850737","https://openalex.org/W3005923092","https://openalex.org/W3007123499","https://openalex.org/W3008088605","https://openalex.org/W3008983606","https://openalex.org/W3011418477","https://openalex.org/W3018199279","https://openalex.org/W3026248346","https://openalex.org/W3049097090","https://openalex.org/W3081023540","https://openalex.org/W3089979403","https://openalex.org/W3105493346","https://openalex.org/W3114565874","https://openalex.org/W3114775794","https://openalex.org/W3114953961","https://openalex.org/W3116637734","https://openalex.org/W3127626522","https://openalex.org/W3127637494","https://openalex.org/W3132130139","https://openalex.org/W3138507382","https://openalex.org/W3157916761","https://openalex.org/W3161847995","https://openalex.org/W3162231345","https://openalex.org/W3162738495","https://openalex.org/W3162979535","https://openalex.org/W3169996637","https://openalex.org/W3173922570","https://openalex.org/W3182276460","https://openalex.org/W3184038852","https://openalex.org/W3196561854","https://openalex.org/W3203210388","https://openalex.org/W3204480019","https://openalex.org/W3204813235","https://openalex.org/W3210673560","https://openalex.org/W4205585947","https://openalex.org/W4205733303","https://openalex.org/W4212936814","https://openalex.org/W4213270655","https://openalex.org/W4246977929","https://openalex.org/W4248078407","https://openalex.org/W4256109500","https://openalex.org/W4285231198","https://openalex.org/W4288057706","https://openalex.org/W4294326404","https://openalex.org/W4313491500","https://openalex.org/W4382517020","https://openalex.org/W4383370129","https://openalex.org/W4385464783","https://openalex.org/W4387492912","https://openalex.org/W4390036527","https://openalex.org/W4390112531","https://openalex.org/W4390401837","https://openalex.org/W4390401848","https://openalex.org/W4391493782","https://openalex.org/W4392399461","https://openalex.org/W4393033150","https://openalex.org/W4399589564","https://openalex.org/W6760739051","https://openalex.org/W6781328473","https://openalex.org/W6781343710","https://openalex.org/W6786756326","https://openalex.org/W6791536122","https://openalex.org/W6798218651","https://openalex.org/W6801950474"],"related_works":["https://openalex.org/W3006344745","https://openalex.org/W182679101","https://openalex.org/W2103519941","https://openalex.org/W3180573957","https://openalex.org/W2162805750","https://openalex.org/W2043669269","https://openalex.org/W1968560271","https://openalex.org/W4388856880","https://openalex.org/W2081998479","https://openalex.org/W2751059292"],"abstract_inverted_index":{"During":[0],"the":[1,10,63,70,82,103,134],"years":[2],"2018-2024,":[3],"considerable":[4],"advancements":[5],"have":[6,116],"been":[7,131],"achieved":[8],"in":[9,98,102,119,125],"use":[11],"of":[12,21,43,69],"deep":[13,143,158],"learning":[14,94,129,144,159],"for":[15,40,114,148,161],"side":[16,166],"channel":[17,167],"attacks.":[18],"The":[19,31,74],"security":[20],"cryptographic":[22],"algorithm":[23],"implementations":[24],"is":[25,33,53,77,95,169],"put":[26],"at":[27],"risk":[28],"by":[29,66,80],"this.":[30],"aim":[32],"to":[34,61,84],"conceptually":[35],"keep":[36],"an":[37],"eye":[38],"out":[39],"specific":[41],"types":[42],"information":[44],"loss,":[45],"like":[46],"power":[47],"usage,":[48],"on":[49,156],"a":[50,59,90,153],"chip":[51],"that":[52,86],"doing":[54],"encryption.":[55],"Next,":[56],"one":[57],"trains":[58],"model":[60,83],"identify":[62],"encryption":[64,72,75,163],"key":[65,76],"using":[67],"expertise":[68],"underpinning":[71],"algorithm.":[73],"then":[78],"recovered":[79],"applying":[81],"traces":[85],"were":[87],"obtained":[88],"from":[89],"victim":[91],"chip.":[92],"Deep":[93,128],"being":[96],"used":[97],"many":[99],"different":[100],"fields":[101],"past":[104],"several":[105],"years.":[106],"Convolutional":[107],"neural":[108,112],"networks":[109],"and":[110,122],"recurrent":[111],"networks,":[113],"instance,":[115],"demonstrated":[117],"efficacy":[118],"text":[120],"generation":[121],"object":[123],"detection":[124],"images,":[126],"respectively.":[127],"has":[130],"effective":[132],"throughout":[133],"side-channel":[135],"analysis":[136],"field.":[137],"Until":[138],"2024,":[139],"there":[140],"was":[141],"no":[142],"layers":[145],"made":[146],"especially":[147],"SCAs.":[149],"In":[150],"this":[151],"article,":[152],"systematic":[154],"review":[155],"hybrid":[157],"models":[160],"enhancing":[162],"techniques":[164],"against":[165],"attacks":[168],"presented":[170],"here.":[171]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":6}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
