{"id":"https://openalex.org/W4390401848","doi":"https://doi.org/10.1109/itnac59571.2023.10368563","title":"Detection of Crucial Power Side Channel Data Leakage in Neural Networks","display_name":"Detection of Crucial Power Side Channel Data Leakage in Neural Networks","publication_year":2023,"publication_date":"2023-11-29","ids":{"openalex":"https://openalex.org/W4390401848","doi":"https://doi.org/10.1109/itnac59571.2023.10368563"},"language":"en","primary_location":{"id":"doi:10.1109/itnac59571.2023.10368563","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itnac59571.2023.10368563","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 33rd International Telecommunication Networks and Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002040454","display_name":"Amjed Abbas Ahmed","orcid":"https://orcid.org/0000-0001-6069-2967"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]},{"id":"https://openalex.org/I3040621137","display_name":"Alsalam University College","ror":"https://ror.org/0047hkh43","country_code":"IQ","type":"education","lineage":["https://openalex.org/I3040621137"]}],"countries":["IQ","MY"],"is_corresponding":true,"raw_author_name":"Amjed Abbas Ahmed","raw_affiliation_strings":["Universiti Kebangsaan Malaysia (UKM),Center for Cyber Security, Faculty of Information Science and Technology,Bangi,Malaysia,43600","Department of Computer Techniques Engineering, Imam Al-Kadhum College (IKC), Baghdad, Iraq"],"affiliations":[{"raw_affiliation_string":"Universiti Kebangsaan Malaysia (UKM),Center for Cyber Security, Faculty of Information Science and Technology,Bangi,Malaysia,43600","institution_ids":["https://openalex.org/I885383172"]},{"raw_affiliation_string":"Department of Computer Techniques Engineering, Imam Al-Kadhum College (IKC), Baghdad, Iraq","institution_ids":["https://openalex.org/I3040621137"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084720361","display_name":"Mohammad Kamrul Hasan","orcid":"https://orcid.org/0000-0001-5511-0205"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Mohammad Kamrul Hasan","raw_affiliation_strings":["Universiti Kebangsaan Malaysia (UKM),Center for Cyber Security, Faculty of Information Science and Technology,Bangi,Malaysia,43600"],"affiliations":[{"raw_affiliation_string":"Universiti Kebangsaan Malaysia (UKM),Center for Cyber Security, Faculty of Information Science and Technology,Bangi,Malaysia,43600","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020997421","display_name":"Nurhizam Safie Mohd Satar","orcid":"https://orcid.org/0000-0003-3389-3936"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Nurhizam Safie Mohd Satar","raw_affiliation_strings":["Universiti Kebangsaan Malaysia (UKM),Center for Cyber Security, Faculty of Information Science and Technology,Bangi,Malaysia,43600"],"affiliations":[{"raw_affiliation_string":"Universiti Kebangsaan Malaysia (UKM),Center for Cyber Security, Faculty of Information Science and Technology,Bangi,Malaysia,43600","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085570788","display_name":"Nazmus Shaker Nafi","orcid":"https://orcid.org/0000-0001-6244-6073"},"institutions":[{"id":"https://openalex.org/I3154244067","display_name":"Dairy Australia (Australia)","ror":"https://ror.org/02145de51","country_code":"AU","type":"company","lineage":["https://openalex.org/I3154244067"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Nazmus Shaker Nafi","raw_affiliation_strings":["Integrated Work Package, KBR, Southbank,Victoria,Australia","Integrated Work Package, KBR, Southbank, Victoria, Australia"],"affiliations":[{"raw_affiliation_string":"Integrated Work Package, KBR, Southbank,Victoria,Australia","institution_ids":["https://openalex.org/I3154244067"]},{"raw_affiliation_string":"Integrated Work Package, KBR, Southbank, Victoria, Australia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073112703","display_name":"Azana Hafizah Mohd Aman","orcid":"https://orcid.org/0000-0001-7337-6736"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Azana Hafizah Aman","raw_affiliation_strings":["Universiti Kebangsaan Malaysia (UKM),Center for Cyber Security, Faculty of Information Science and Technology,Bangi,Malaysia,43600"],"affiliations":[{"raw_affiliation_string":"Universiti Kebangsaan Malaysia (UKM),Center for Cyber Security, Faculty of Information Science and Technology,Bangi,Malaysia,43600","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101532570","display_name":"Shayla Islam","orcid":"https://orcid.org/0000-0002-0490-7799"},"institutions":[{"id":"https://openalex.org/I55285296","display_name":"UCSI University","ror":"https://ror.org/019787q29","country_code":"MY","type":"education","lineage":["https://openalex.org/I55285296"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Shayla Islam","raw_affiliation_strings":["Institute of Computer Science and Digital Innovation, UCSI University,Kuala Lumpur,Malaysia,56000"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Science and Digital Innovation, UCSI University,Kuala Lumpur,Malaysia,56000","institution_ids":["https://openalex.org/I55285296"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000849286","display_name":"Saif Aamer Fadhil","orcid":null},"institutions":[{"id":"https://openalex.org/I3040621137","display_name":"Alsalam University College","ror":"https://ror.org/0047hkh43","country_code":"IQ","type":"education","lineage":["https://openalex.org/I3040621137"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Saif Aamer Fadhil","raw_affiliation_strings":["Imam Al-Kadhum College (IKC),Department of Computer Techniques Engineering,Baghdad,Iraq,10011"],"affiliations":[{"raw_affiliation_string":"Imam Al-Kadhum College (IKC),Department of Computer Techniques Engineering,Baghdad,Iraq,10011","institution_ids":["https://openalex.org/I3040621137"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5002040454"],"corresponding_institution_ids":["https://openalex.org/I3040621137","https://openalex.org/I885383172"],"apc_list":null,"apc_paid":null,"fwci":2.9611,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.93033752,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"57","last_page":"62"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.8410525321960449},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7218058109283447},{"id":"https://openalex.org/keywords/margin","display_name":"Margin (machine learning)","score":0.6439435482025146},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5986724495887756},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.517917811870575},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.502056360244751},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.48280656337738037},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.4478873312473297},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3741884231567383},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3560779392719269},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3275405764579773},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3221049904823303},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2687528729438782},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22678515315055847},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.11842021346092224}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.8410525321960449},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7218058109283447},{"id":"https://openalex.org/C774472","wikidata":"https://www.wikidata.org/wiki/Q6760393","display_name":"Margin (machine learning)","level":2,"score":0.6439435482025146},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5986724495887756},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.517917811870575},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.502056360244751},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.48280656337738037},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.4478873312473297},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3741884231567383},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3560779392719269},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3275405764579773},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3221049904823303},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2687528729438782},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22678515315055847},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.11842021346092224},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itnac59571.2023.10368563","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itnac59571.2023.10368563","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 33rd International Telecommunication Networks and Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2911054806","https://openalex.org/W2920685123","https://openalex.org/W2951428781","https://openalex.org/W3045670632","https://openalex.org/W3046451506","https://openalex.org/W3092310121","https://openalex.org/W3114775794","https://openalex.org/W3131321414","https://openalex.org/W3132130139","https://openalex.org/W3154592730","https://openalex.org/W3162979535","https://openalex.org/W3183466684","https://openalex.org/W3196561854","https://openalex.org/W4205585947","https://openalex.org/W4226161613","https://openalex.org/W4248078407","https://openalex.org/W4285231198","https://openalex.org/W4294326404","https://openalex.org/W4386231545","https://openalex.org/W4386526748","https://openalex.org/W6760739051","https://openalex.org/W6781343710"],"related_works":["https://openalex.org/W2922420188","https://openalex.org/W2022533428","https://openalex.org/W2580249689","https://openalex.org/W2103519941","https://openalex.org/W2769734684","https://openalex.org/W2969678054","https://openalex.org/W2903787673","https://openalex.org/W2777343049","https://openalex.org/W3158338108","https://openalex.org/W2584285084"],"abstract_inverted_index":{"Neural":[0],"network":[1,128,137],"(NN)":[2],"accelerators":[3,55,82,91,184],"are":[4],"now":[5],"extensively":[6],"utilized":[7],"in":[8,120,185],"a":[9,15,70],"range":[10],"of":[11,18,89,97,100,163],"applications":[12],"that":[13,74,146],"need":[14],"high":[16,34],"degree":[17],"security,":[19],"such":[20],"as":[21],"driverless":[22],"cars,":[23],"NLP,":[24],"and":[25,32,52],"image":[26],"recognition.":[27],"Due":[28],"to":[29,109,154,176],"privacy":[30],"issues":[31],"the":[33,126,135,147,157,161],"cost,":[35],"hardware":[36],"implementations":[37],"contained":[38],"within":[39],"NN":[40,81,159,183],"Propagators":[41],"were":[42],"often":[43],"not":[44],"accessible":[45],"for":[46,181],"general":[47],"populace.":[48],"Additionally":[49],"with":[50],"power":[51],"time":[53],"data,":[54],"also":[56],"disclose":[57],"critical":[58,173],"data":[59,108],"by":[60],"electro-magnetic":[61],"(EM)":[62,179],"sided":[63],"channels.":[64],"Within":[65],"this":[66],"study,":[67],"we":[68],"demonstrate":[69,145],"side-channel":[71,107,165],"information-based":[72],"attack":[73,98,149,170],"can":[75,151],"successfully":[76],"steal":[77],"models":[78],"from":[79,130,139],"large-scale":[80,158],"deployed":[83],"on":[84],"real-world":[85],"hardware.":[86],"The":[87,94],"use":[88,162],"these":[90],"is":[92,175],"widespread.":[93],"proposed":[95],"method":[96],"consists":[99],"two":[101],"distinct":[102],"phases:":[103],"1)":[104],"Using":[105,115],"EM":[106,131,140,164],"estimate":[110],"networking's":[111],"underlying":[112,127,136],"architecture;":[113],"2)":[114],"margin-dependent,":[116],"attackers":[117],"learning":[118],"actively":[119],"estimating":[121],"parameters,":[122],"notably":[123],"weights.":[124],"Deducing":[125],"structure":[129,138],"sidechannel":[132,141],"data.":[133,142],"Inferring":[134],"Experimental":[143],"findings":[144],"disclosed":[148],"technique":[150],"be":[152],"used":[153],"precisely":[155],"retrieve":[156],"via":[160],"information":[166],"leaking.":[167],"Overall,":[168],"our":[169],"shows":[171],"how":[172],"it":[174],"conceal":[177],"electromagnetic":[178],"traces":[180],"massive":[182],"practical":[186],"settings.":[187]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":10}],"updated_date":"2026-02-27T16:54:17.756197","created_date":"2025-10-10T00:00:00"}
