{"id":"https://openalex.org/W4403447531","doi":"https://doi.org/10.1109/acit62333.2024.10712474","title":"Enhancing Side-Channel Attacks Prediction using Convolutional Neural Networks","display_name":"Enhancing Side-Channel Attacks Prediction using Convolutional Neural Networks","publication_year":2024,"publication_date":"2024-09-19","ids":{"openalex":"https://openalex.org/W4403447531","doi":"https://doi.org/10.1109/acit62333.2024.10712474"},"language":"en","primary_location":{"id":"doi:10.1109/acit62333.2024.10712474","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit62333.2024.10712474","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 14th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075452604","display_name":"Khalid Alemerien","orcid":"https://orcid.org/0000-0003-4485-8298"},"institutions":[{"id":"https://openalex.org/I114432678","display_name":"Tafila Technical University","ror":"https://ror.org/04jzmk773","country_code":"JO","type":"education","lineage":["https://openalex.org/I114432678"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Khalid Alemerien","raw_affiliation_strings":["Tafila Technical University,Information Technology Department,Tafila,Jordan"],"affiliations":[{"raw_affiliation_string":"Tafila Technical University,Information Technology Department,Tafila,Jordan","institution_ids":["https://openalex.org/I114432678"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5096913002","display_name":"Sadeq Al-Suhemat","orcid":null},"institutions":[{"id":"https://openalex.org/I92449659","display_name":"Isra University","ror":"https://ror.org/04d4bt482","country_code":"JO","type":"education","lineage":["https://openalex.org/I92449659"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Sadeq Al-Suhemat","raw_affiliation_strings":["Isra University,Faculty of Information Technology,Amman,Jordan"],"affiliations":[{"raw_affiliation_string":"Isra University,Faculty of Information Technology,Amman,Jordan","institution_ids":["https://openalex.org/I92449659"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061881339","display_name":"Fadi Mohammad Alsuhimat","orcid":null},"institutions":[{"id":"https://openalex.org/I153921779","display_name":"Philadelphia University","ror":"https://ror.org/05mqvn149","country_code":"JO","type":"education","lineage":["https://openalex.org/I153921779"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Fadi Alsuhimat","raw_affiliation_strings":["Philadelphia University,Cyber Security Department,Amman,Jordan"],"affiliations":[{"raw_affiliation_string":"Philadelphia University,Cyber Security Department,Amman,Jordan","institution_ids":["https://openalex.org/I153921779"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5114286268","display_name":"Enshirah Altarawneh","orcid":"https://orcid.org/0000-0002-3013-2819"},"institutions":[{"id":"https://openalex.org/I157392197","display_name":"Hashemite University","ror":"https://ror.org/04a1r5z94","country_code":"JO","type":"education","lineage":["https://openalex.org/I157392197"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Enshirah Altarawneh","raw_affiliation_strings":["Hashemite University,Computer Engineering Department,Zarqa,Jordan"],"affiliations":[{"raw_affiliation_string":"Hashemite University,Computer Engineering Department,Zarqa,Jordan","institution_ids":["https://openalex.org/I157392197"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5075452604"],"corresponding_institution_ids":["https://openalex.org/I114432678"],"apc_list":null,"apc_paid":null,"fwci":0.7252,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.76707982,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"505","last_page":"510"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.983299970626831,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9706000089645386,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.8297112584114075},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.7779576778411865},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7682836055755615},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.42238783836364746},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.37790876626968384},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.33490779995918274},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3068428039550781},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2828306257724762},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.22002246975898743}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.8297112584114075},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.7779576778411865},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7682836055755615},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.42238783836364746},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37790876626968384},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.33490779995918274},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3068428039550781},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2828306257724762},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.22002246975898743}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit62333.2024.10712474","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit62333.2024.10712474","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 14th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1461374287","https://openalex.org/W2064675550","https://openalex.org/W2136655611","https://openalex.org/W2556867355","https://openalex.org/W2746796098","https://openalex.org/W2772679153","https://openalex.org/W2798435099","https://openalex.org/W2963108767","https://openalex.org/W2993973109","https://openalex.org/W3000118231","https://openalex.org/W3021603394","https://openalex.org/W3043107624","https://openalex.org/W3132657580","https://openalex.org/W3162231345","https://openalex.org/W3168115119","https://openalex.org/W3170647102","https://openalex.org/W3183900321","https://openalex.org/W3203012334","https://openalex.org/W3203210388","https://openalex.org/W4213270655","https://openalex.org/W4223463334","https://openalex.org/W4245524709","https://openalex.org/W4285812939","https://openalex.org/W4288055157","https://openalex.org/W4293791139","https://openalex.org/W4308325339","https://openalex.org/W4323065838","https://openalex.org/W4380080590","https://openalex.org/W4383221534","https://openalex.org/W4385412288","https://openalex.org/W4386526748","https://openalex.org/W4387120907","https://openalex.org/W4393302616","https://openalex.org/W6776276478","https://openalex.org/W6791148188","https://openalex.org/W6840619232"],"related_works":["https://openalex.org/W4323824501","https://openalex.org/W2355552010","https://openalex.org/W2136687465","https://openalex.org/W3016859066","https://openalex.org/W4293226380","https://openalex.org/W5280335","https://openalex.org/W4200321003","https://openalex.org/W4400339423","https://openalex.org/W3215861253","https://openalex.org/W4252980856"],"abstract_inverted_index":{"A":[0],"common":[1],"type":[2],"of":[3,58,94,165,175,181,190,199],"cyberattack":[4],"is":[5],"the":[6,54,76,86,92,103,108,113,150,160,173,179],"side":[7],"channel":[8],"attack":[9],"(SCA),":[10],"which":[11],"affects":[12],"many":[13],"devices":[14],"and":[15,36,39,56,149,158,195],"equipment":[16],"connected":[17],"to":[18,53,83,90,136,143,156],"a":[19,132,140,169,196],"network.":[20],"These":[21],"attacks":[22,28,145],"have":[23,81],"different":[24],"types,":[25],"like":[26],"power":[27,144],"such":[29],"as":[30,49],"DPA,":[31],"electromagnetic":[32],"attacks,":[33,35,96],"storage":[34],"others.":[37],"Researchers":[38],"information":[40],"security":[41],"experts":[42],"are":[43],"concerned":[44],"about":[45],"SCA":[46,67,87,194],"targeting":[47],"devices,":[48],"they":[50,98],"can":[51,69],"lead":[52],"loss":[55,197],"theft":[57],"important":[59],"information.":[60],"Using":[61],"deep":[62,119,133],"learning":[63,117,120],"(DL)":[64],"techniques":[65,121,177],"in":[66,88,101,106,129,172,178,192],"analysis":[68],"be":[70],"an":[71,188],"efficient":[72,115],"tool":[73],"for":[74,122],"detecting":[75,102,193],"SCA.":[77,182],"Many":[78],"previous":[79],"works":[80],"tried":[82],"carry":[84],"out":[85],"order":[89],"mitigate":[91],"impact":[93],"these":[95],"but":[97],"encountered":[99],"difficulties":[100],"SCA,":[104],"whether":[105],"selecting":[107],"suitable":[109],"dataset":[110,141],"or":[111,118],"applying":[112],"most":[114],"machine":[116],"achieving":[123],"high":[124],"performance.":[125],"Therefore,":[126],"we":[127],"developed":[128],"this":[130],"paper":[131],"learning-based":[134],"model":[135,186],"detect":[137],"SCAs":[138],"using":[139],"related":[142],"(the":[146],"DPAv4":[147,161],"dataset)":[148],"Convolutional":[151],"Neural":[152],"Networks":[153],"(CNN)":[154],"algorithm":[155],"train":[157],"test":[159],"dataset.":[162],"The":[163,183],"findings":[164],"our":[166],"experiments":[167],"showed":[168],"significant":[170],"improvement":[171],"performance":[174],"DL-based":[176],"detection":[180],"proposed":[184],"CNN-based":[185],"achieved":[187],"accuracy":[189],"0.814":[191],"rate":[198],"0.581.":[200]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
