{"id":"https://openalex.org/W3162231345","doi":"https://doi.org/10.1109/isqed51717.2021.9424305","title":"Leveraging Deep CNN and Transfer Learning for Side-Channel Attack","display_name":"Leveraging Deep CNN and Transfer Learning for Side-Channel Attack","publication_year":2021,"publication_date":"2021-04-07","ids":{"openalex":"https://openalex.org/W3162231345","doi":"https://doi.org/10.1109/isqed51717.2021.9424305","mag":"3162231345"},"language":"en","primary_location":{"id":"doi:10.1109/isqed51717.2021.9424305","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed51717.2021.9424305","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054378457","display_name":"Amit Garg","orcid":"https://orcid.org/0000-0001-8366-212X"},"institutions":[{"id":"https://openalex.org/I51504820","display_name":"San Jose State University","ror":"https://ror.org/04qyvz380","country_code":"US","type":"education","lineage":["https://openalex.org/I51504820"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Amit Garg","raw_affiliation_strings":["Deportment of Computer Engineering, San Jose State University, San Jose, California, USA"],"affiliations":[{"raw_affiliation_string":"Deportment of Computer Engineering, San Jose State University, San Jose, California, USA","institution_ids":["https://openalex.org/I51504820"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014914538","display_name":"Nima Karimian","orcid":"https://orcid.org/0000-0002-4590-7170"},"institutions":[{"id":"https://openalex.org/I51504820","display_name":"San Jose State University","ror":"https://ror.org/04qyvz380","country_code":"US","type":"education","lineage":["https://openalex.org/I51504820"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nima Karimian","raw_affiliation_strings":["Deportment of Computer Engineering, San Jose State University, San Jose, California, USA"],"affiliations":[{"raw_affiliation_string":"Deportment of Computer Engineering, San Jose State University, San Jose, California, USA","institution_ids":["https://openalex.org/I51504820"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5054378457"],"corresponding_institution_ids":["https://openalex.org/I51504820"],"apc_list":null,"apc_paid":null,"fwci":1.2237,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.8297783,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"91","last_page":"96"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9459999799728394,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8397054672241211},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.7920742034912109},{"id":"https://openalex.org/keywords/transfer-of-learning","display_name":"Transfer of learning","score":0.6637066006660461},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6584099531173706},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.616570234298706},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5086680054664612},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.49103593826293945},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4684826135635376},{"id":"https://openalex.org/keywords/wavelet","display_name":"Wavelet","score":0.43024879693984985},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3661624789237976},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.19107505679130554},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.10754361748695374}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8397054672241211},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.7920742034912109},{"id":"https://openalex.org/C150899416","wikidata":"https://www.wikidata.org/wiki/Q1820378","display_name":"Transfer of learning","level":2,"score":0.6637066006660461},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6584099531173706},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.616570234298706},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5086680054664612},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.49103593826293945},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4684826135635376},{"id":"https://openalex.org/C47432892","wikidata":"https://www.wikidata.org/wiki/Q831390","display_name":"Wavelet","level":2,"score":0.43024879693984985},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3661624789237976},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.19107505679130554},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.10754361748695374},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isqed51717.2021.9424305","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed51717.2021.9424305","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.49000000953674316,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1480799882","https://openalex.org/W1522301498","https://openalex.org/W1560027954","https://openalex.org/W1562542037","https://openalex.org/W1686810756","https://openalex.org/W1836465849","https://openalex.org/W1862426464","https://openalex.org/W2048702750","https://openalex.org/W2095705004","https://openalex.org/W2097117768","https://openalex.org/W2154909745","https://openalex.org/W2165698076","https://openalex.org/W2183341477","https://openalex.org/W2194775991","https://openalex.org/W2302255633","https://openalex.org/W2903143476","https://openalex.org/W2914572864","https://openalex.org/W2945476062","https://openalex.org/W2949117887","https://openalex.org/W2953355178","https://openalex.org/W2954035222","https://openalex.org/W2963163009","https://openalex.org/W2964121744","https://openalex.org/W3008439737","https://openalex.org/W3048511759","https://openalex.org/W4245524709","https://openalex.org/W6631190155","https://openalex.org/W6637373629","https://openalex.org/W6638667902","https://openalex.org/W6674330103","https://openalex.org/W6759495720","https://openalex.org/W6781591687"],"related_works":["https://openalex.org/W4226493464","https://openalex.org/W3133861977","https://openalex.org/W3183901164","https://openalex.org/W4206357785","https://openalex.org/W4281381188","https://openalex.org/W2951211570","https://openalex.org/W3192840557","https://openalex.org/W3103566983","https://openalex.org/W3135818718","https://openalex.org/W4290188444"],"abstract_inverted_index":{"The":[0],"adoption":[1],"of":[2,19,46,78,121],"deep":[3,23,65,87,164],"neural":[4],"networks":[5],"for":[6,13,29],"profiled":[7],"side-channel":[8],"attacks":[9],"provides":[10],"powerful":[11],"options":[12],"leakage":[14],"detection":[15],"and":[16,73,93,109,125],"key":[17,101,153,172],"retrieval":[18],"secure":[20],"products.":[21],"Although":[22],"learning":[24],"is":[25,70,160,174],"being":[26],"widely":[27],"adopted":[28],"computer":[30],"vision,":[31],"less":[32,175],"research":[33],"has":[34],"been":[35],"prominent":[36],"in":[37],"template-based":[38],"profiling":[39],"power":[40,123,140],"SCA":[41],"attacks.":[42],"In":[43,103],"addition,":[44],"most":[45],"the":[47,122,129,157],"existing":[48],"works":[49],"fall":[50],"into":[51],"a":[52,64,75,115,152],"one-dimensional":[53],"(1-D)":[54],"CNN":[55,61,67,108,137,165],"technique":[56],"rather":[57],"than":[58,176],"two-dimensional":[59],"(2-D)":[60],"methods.":[62],"Training":[63],"2-D":[66,88,107],"from":[68,128],"scratch":[69],"computationally":[71],"expensive":[72],"requires":[74],"large":[76],"amount":[77],"training":[79],"data.":[80],"To":[81,147],"overcome":[82],"these":[83],"challenges,":[84],"we":[85,112,133],"adopt":[86],"CNNs,":[89],"GoogLeNet,":[90],"InceptionV3,":[91],"VGG16,":[92],"MobileNetV2":[94],"pre-trained":[95],"to":[96,105,143],"identify":[97],"all":[98],"possible":[99],"AES":[100],"bytes.":[102],"order":[104],"use":[106],"transfer":[110],"learning,":[111],"also":[113],"propose":[114,134],"novel":[116],"multi-scale":[117],"continuous":[118],"wavelet":[119,130],"transform":[120],"traces":[124,141],"generate":[126],"scalograms":[127],"coefficients.":[131],"Moreover,":[132],"ResNet":[135],"1-D":[136],"architecture":[138],"using":[139],"signal":[142],"break":[144],"AES-128":[145],"implementation.":[146],"evaluate":[148],"our":[149],"proposed":[150,163],"work,":[151],"rank":[154,173],"metric":[155],"with":[156],"ASCAD":[158],"dataset":[159],"utilized.":[161],"Our":[162],"framework":[166],"achieves":[167],"\u2265":[168],"99":[169],"accuracy":[170],"when":[171],"10.":[177]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
