{"id":"https://openalex.org/W4390401837","doi":"https://doi.org/10.1109/itnac59571.2023.10368560","title":"Design of Lightweight Cryptography based Deep Learning Model for Side Channel Attacks","display_name":"Design of Lightweight Cryptography based Deep Learning Model for Side Channel Attacks","publication_year":2023,"publication_date":"2023-11-29","ids":{"openalex":"https://openalex.org/W4390401837","doi":"https://doi.org/10.1109/itnac59571.2023.10368560"},"language":"en","primary_location":{"id":"doi:10.1109/itnac59571.2023.10368560","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itnac59571.2023.10368560","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 33rd International Telecommunication Networks and Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002040454","display_name":"Amjed Abbas Ahmed","orcid":"https://orcid.org/0000-0001-6069-2967"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]},{"id":"https://openalex.org/I3040621137","display_name":"Alsalam University College","ror":"https://ror.org/0047hkh43","country_code":"IQ","type":"education","lineage":["https://openalex.org/I3040621137"]}],"countries":["IQ","MY"],"is_corresponding":true,"raw_author_name":"Amjed Abbas Ahmed","raw_affiliation_strings":["Universiti Kebangsaan Malaysia (UKM),Center for Cyber Security Faculty of Information Science and Technology,Bangi,Malaysia,43600","Department of Computer Techniques Engineering, Imam Al-Kadhum College (IKC), Baghdad, Iraq"],"affiliations":[{"raw_affiliation_string":"Universiti Kebangsaan Malaysia (UKM),Center for Cyber Security Faculty of Information Science and Technology,Bangi,Malaysia,43600","institution_ids":["https://openalex.org/I885383172"]},{"raw_affiliation_string":"Department of Computer Techniques Engineering, Imam Al-Kadhum College (IKC), Baghdad, Iraq","institution_ids":["https://openalex.org/I3040621137"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084720361","display_name":"Mohammad Kamrul Hasan","orcid":"https://orcid.org/0000-0001-5511-0205"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Mohammad Kamrul Hasan","raw_affiliation_strings":["Universiti Kebangsaan Malaysia (UKM),Center for Cyber Security Faculty of Information Science and Technology,Bangi,Malaysia,43600"],"affiliations":[{"raw_affiliation_string":"Universiti Kebangsaan Malaysia (UKM),Center for Cyber Security Faculty of Information Science and Technology,Bangi,Malaysia,43600","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085570788","display_name":"Nazmus Shaker Nafi","orcid":"https://orcid.org/0000-0001-6244-6073"},"institutions":[{"id":"https://openalex.org/I3154244067","display_name":"Dairy Australia (Australia)","ror":"https://ror.org/02145de51","country_code":"AU","type":"company","lineage":["https://openalex.org/I3154244067"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Nazmus Shaker Nafi","raw_affiliation_strings":["Integrated Work Package, KBR,Southbank,Victoria,Australia","Integrated Work Package, KBR, Southbank, Victoria, Australia"],"affiliations":[{"raw_affiliation_string":"Integrated Work Package, KBR,Southbank,Victoria,Australia","institution_ids":["https://openalex.org/I3154244067"]},{"raw_affiliation_string":"Integrated Work Package, KBR, Southbank, Victoria, Australia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073112703","display_name":"Azana Hafizah Mohd Aman","orcid":"https://orcid.org/0000-0001-7337-6736"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Azana Hafizah Aman","raw_affiliation_strings":["Universiti Kebangsaan Malaysia (UKM),Center for Cyber Security Faculty of Information Science and Technology,Bangi,Malaysia,43600"],"affiliations":[{"raw_affiliation_string":"Universiti Kebangsaan Malaysia (UKM),Center for Cyber Security Faculty of Information Science and Technology,Bangi,Malaysia,43600","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101532570","display_name":"Shayla Islam","orcid":"https://orcid.org/0000-0002-0490-7799"},"institutions":[{"id":"https://openalex.org/I55285296","display_name":"UCSI University","ror":"https://ror.org/019787q29","country_code":"MY","type":"education","lineage":["https://openalex.org/I55285296"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Shayla Islam","raw_affiliation_strings":["Institute of Computer Science and Digital Innovation, UCSI University,Kuala Lumpur,Malaysia,56000"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Science and Digital Innovation, UCSI University,Kuala Lumpur,Malaysia,56000","institution_ids":["https://openalex.org/I55285296"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000849286","display_name":"Saif Aamer Fadhil","orcid":null},"institutions":[{"id":"https://openalex.org/I3040621137","display_name":"Alsalam University College","ror":"https://ror.org/0047hkh43","country_code":"IQ","type":"education","lineage":["https://openalex.org/I3040621137"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Saif Aamer Fadhil","raw_affiliation_strings":["Imam Al-Kadhum College (IKC),Department of Computer Techniques Engineering,Baghdad,Iraq,10011"],"affiliations":[{"raw_affiliation_string":"Imam Al-Kadhum College (IKC),Department of Computer Techniques Engineering,Baghdad,Iraq,10011","institution_ids":["https://openalex.org/I3040621137"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5002040454"],"corresponding_institution_ids":["https://openalex.org/I3040621137","https://openalex.org/I885383172"],"apc_list":null,"apc_paid":null,"fwci":2.7972,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.92580369,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"325","last_page":"328"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.819679319858551},{"id":"https://openalex.org/keywords/overfitting","display_name":"Overfitting","score":0.7260953187942505},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6957510113716125},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.622879683971405},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.6057817339897156},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5813822150230408},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5801492929458618},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5501837730407715},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4970989525318146},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4580612778663635},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4411923587322235},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.43916428089141846},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.438346803188324},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.24996021389961243},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.189890056848526}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.819679319858551},{"id":"https://openalex.org/C22019652","wikidata":"https://www.wikidata.org/wiki/Q331309","display_name":"Overfitting","level":3,"score":0.7260953187942505},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6957510113716125},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.622879683971405},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.6057817339897156},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5813822150230408},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5801492929458618},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5501837730407715},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4970989525318146},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4580612778663635},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4411923587322235},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.43916428089141846},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.438346803188324},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.24996021389961243},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.189890056848526},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itnac59571.2023.10368560","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itnac59571.2023.10368560","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 33rd International Telecommunication Networks and Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2911054806","https://openalex.org/W2921829440","https://openalex.org/W2945453534","https://openalex.org/W2945873538","https://openalex.org/W2947103291","https://openalex.org/W2954035222","https://openalex.org/W2989659803","https://openalex.org/W2993973109","https://openalex.org/W3004850737","https://openalex.org/W3026248346","https://openalex.org/W3089979403","https://openalex.org/W3105493346","https://openalex.org/W3112266185","https://openalex.org/W3116079126","https://openalex.org/W3162231345","https://openalex.org/W3182276460","https://openalex.org/W3203210388","https://openalex.org/W4248078407","https://openalex.org/W4280529198","https://openalex.org/W4293791139","https://openalex.org/W4386231545","https://openalex.org/W4386526748","https://openalex.org/W6798218651"],"related_works":["https://openalex.org/W4362597605","https://openalex.org/W3006344745","https://openalex.org/W182679101","https://openalex.org/W2103519941","https://openalex.org/W3180573957","https://openalex.org/W2162805750","https://openalex.org/W2043669269","https://openalex.org/W1968560271","https://openalex.org/W4388856880","https://openalex.org/W2081998479"],"abstract_inverted_index":{"Depending":[0],"on":[1,218],"a":[2,6,79,119,126,175],"device's":[3],"encryption":[4],"mechanism,":[5],"wide":[7],"variety":[8],"of":[9,36,51,66,76,130,146,168,177,207],"tangible":[10],"details":[11],"could":[12],"be":[13],"exposed.":[14],"These":[15],"leaks":[16],"are":[17,59,110],"used":[18,24,61,150],"in":[19,78,98,151,192],"side-channel":[20,148],"analysis,":[21],"which":[22,87,199],"is":[23,70,184,190],"to":[25,29,33],"get":[26],"keys.":[27],"Due":[28],"deep":[30],"learning's":[31],"sensitivity":[32],"the":[34,37,47,63,67,74,84,93,147,155,169,187,193,202],"characteristics":[35],"data":[38,178],"being":[39,71],"processed,":[40],"using":[41],"such":[42],"algorithms":[43],"can":[44,90],"significantly":[45],"improve":[46],"accuracy":[48],"and":[49,107,163,186],"efficiency":[50,85],"side":[52,214],"channel":[53,215],"analysis.":[54],"However,":[55,92],"classic":[56],"neural":[57,122,131,134,139,197,208],"networks":[58],"now":[60],"for":[62,104,204],"vast":[64],"majority":[65],"work":[68],"that":[69],"done.":[72],"When":[73],"number":[75],"nodes":[77],"network":[80,123,135,140,157],"grows,":[81],"so":[82],"does":[83],"with":[86,137],"key":[88],"recovery":[89],"function.":[91],"method's":[94],"computing":[95],"complexity":[96],"grows":[97],"direct":[99],"proportion.":[100],"Overfitting,":[101],"inadequate":[102],"capacity":[103],"feature":[105,219],"extraction,":[106],"inefficient":[108],"training":[109],"all":[111],"potential":[112],"issues.":[113],"In":[114],"this":[115],"study,":[116],"we":[117],"develop":[118],"compact":[120],"convolutional":[121],"by":[124],"enhancing":[125],"previously":[127],"existing":[128],"combination":[129],"networks.":[132,221],"Novel":[133],"along":[136],"previous":[138],"both":[141],"have":[142],"their":[143],"own":[144],"implementations":[145],"analysis":[149],"comparative":[152],"trials.":[153],"Statistically,":[154],"new":[156,194],"has":[158],"better":[159],"accuracy,":[160],"quicker":[161],"convergence,":[162],"more":[164],"robustness.":[165],"As":[166],"part":[167],"research,":[170],"heatmaps":[171],"were":[172],"provided":[173],"as":[174,201],"means":[176],"visualisation.":[179],"The":[180],"critical":[181],"interval":[182],"concentration":[183],"higher":[185,191],"heat":[188],"value":[189],"network.":[195],"Conventional":[196],"networks,":[198,209],"serve":[200],"foundation":[203],"various":[205],"kinds":[206],"perform":[210],"much":[211],"worse":[212],"than":[213],"studies":[216],"based":[217],"fusion":[220]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":9}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
