{"id":"https://openalex.org/W3119326853","doi":"https://doi.org/10.1109/tetc.2020.3048498","title":"Machine Learning-Based Similarity Attacks for Chaos-based Cryptosystems","display_name":"Machine Learning-Based Similarity Attacks for Chaos-based Cryptosystems","publication_year":2020,"publication_date":"2020-12-31","ids":{"openalex":"https://openalex.org/W3119326853","doi":"https://doi.org/10.1109/tetc.2020.3048498","mag":"3119326853"},"language":"en","primary_location":{"id":"doi:10.1109/tetc.2020.3048498","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetc.2020.3048498","pdf_url":null,"source":{"id":"https://openalex.org/S2496326734","display_name":"IEEE Transactions on Emerging Topics in Computing","issn_l":"2168-6750","issn":["2168-6750","2376-4562"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044091027","display_name":"Junxiu Liu","orcid":"https://orcid.org/0000-0002-9790-1571"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Junxiu Liu","raw_affiliation_strings":["School of Electronic Engineering, Guangxi Normal University, 12388 Guilin, Guangxi, China, (e-mail: j.liu@ieee.org)","[School of Electronic Engineering, Guangxi Normal University, 12388 Guilin, Guangxi, China, (e-mail: j.liu@ieee.org)]"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering, Guangxi Normal University, 12388 Guilin, Guangxi, China, (e-mail: j.liu@ieee.org)","institution_ids":["https://openalex.org/I29739308"]},{"raw_affiliation_string":"[School of Electronic Engineering, Guangxi Normal University, 12388 Guilin, Guangxi, China, (e-mail: j.liu@ieee.org)]","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101501737","display_name":"Shunsheng Zhang","orcid":"https://orcid.org/0000-0003-0783-4051"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shunsheng Zhang","raw_affiliation_strings":["School of Electronic Engineering, Guangxi Normal University, 12388 Guilin, Guangxi, China, (e-mail: 1065355934@qq.com)","[School of Electronic Engineering, Guangxi Normal University, 12388 Guilin, Guangxi, China, (e-mail: 1065355934@qq.com)]"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering, Guangxi Normal University, 12388 Guilin, Guangxi, China, (e-mail: 1065355934@qq.com)","institution_ids":["https://openalex.org/I29739308"]},{"raw_affiliation_string":"[School of Electronic Engineering, Guangxi Normal University, 12388 Guilin, Guangxi, China, (e-mail: 1065355934@qq.com)]","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100614733","display_name":"Yuling Luo","orcid":"https://orcid.org/0000-0002-0117-4614"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuling Luo","raw_affiliation_strings":["School of Electronic Engineering, Guangxi Normal University, 12388 Guilin, Guangxi, China, 510006 (e-mail: yuling0616@gxnu.edu.cn)","[School of Electronic Engineering, Guangxi Normal University, 12388 Guilin, Guangxi, China, 510006 (e-mail: yuling0616@gxnu.edu.cn)]"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering, Guangxi Normal University, 12388 Guilin, Guangxi, China, 510006 (e-mail: yuling0616@gxnu.edu.cn)","institution_ids":["https://openalex.org/I29739308"]},{"raw_affiliation_string":"[School of Electronic Engineering, Guangxi Normal University, 12388 Guilin, Guangxi, China, 510006 (e-mail: yuling0616@gxnu.edu.cn)]","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048496689","display_name":"Lvchen Cao","orcid":"https://orcid.org/0000-0002-6227-9639"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lvchen Cao","raw_affiliation_strings":["School of Electronic Engineering, Guangxi Normal University, 12388 Guilin, Guangxi, China, (e-mail: 18810775110@163.com)","[School of Electronic Engineering, Guangxi Normal University, 12388 Guilin, Guangxi, China, (e-mail: 18810775110@163.com)]"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering, Guangxi Normal University, 12388 Guilin, Guangxi, China, (e-mail: 18810775110@163.com)","institution_ids":["https://openalex.org/I29739308"]},{"raw_affiliation_string":"[School of Electronic Engineering, Guangxi Normal University, 12388 Guilin, Guangxi, China, (e-mail: 18810775110@163.com)]","institution_ids":["https://openalex.org/I29739308"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5044091027"],"corresponding_institution_ids":["https://openalex.org/I29739308"],"apc_list":null,"apc_paid":null,"fwci":0.4914,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.67436255,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9753999710083008,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7959603071212769},{"id":"https://openalex.org/keywords/chaos","display_name":"CHAOS (operating system)","score":0.7065110802650452},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.6471909284591675},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5571776032447815},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.5553483366966248},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4516368508338928},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42898616194725037},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3415130376815796},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26617953181266785}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7959603071212769},{"id":"https://openalex.org/C2779374083","wikidata":"https://www.wikidata.org/wiki/Q5011038","display_name":"CHAOS (operating system)","level":2,"score":0.7065110802650452},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.6471909284591675},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5571776032447815},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.5553483366966248},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4516368508338928},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42898616194725037},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3415130376815796},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26617953181266785},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tetc.2020.3048498","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetc.2020.3048498","pdf_url":null,"source":{"id":"https://openalex.org/S2496326734","display_name":"IEEE Transactions on Emerging Topics in Computing","issn_l":"2168-6750","issn":["2168-6750","2376-4562"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.6399999856948853}],"awards":[{"id":"https://openalex.org/G4996085910","display_name":null,"funder_award_id":"61661008","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5269012489","display_name":null,"funder_award_id":"61801131","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W762437215","https://openalex.org/W1490557050","https://openalex.org/W1511843316","https://openalex.org/W1562542037","https://openalex.org/W1613874182","https://openalex.org/W1752847028","https://openalex.org/W1774054610","https://openalex.org/W1943109301","https://openalex.org/W2008071701","https://openalex.org/W2053001025","https://openalex.org/W2077045974","https://openalex.org/W2119821739","https://openalex.org/W2146852129","https://openalex.org/W2156817460","https://openalex.org/W2166809149","https://openalex.org/W2175079020","https://openalex.org/W2568542549","https://openalex.org/W2742440882","https://openalex.org/W2743732015","https://openalex.org/W2767875127","https://openalex.org/W2801893904","https://openalex.org/W2807517678","https://openalex.org/W2885630459","https://openalex.org/W2888977251","https://openalex.org/W2890533404","https://openalex.org/W2898829402","https://openalex.org/W2902237159","https://openalex.org/W2905420870","https://openalex.org/W2914572864","https://openalex.org/W2923415235","https://openalex.org/W2924585009","https://openalex.org/W2928111998","https://openalex.org/W2944475660","https://openalex.org/W2957417712","https://openalex.org/W2998816190","https://openalex.org/W3004735683","https://openalex.org/W3099004035","https://openalex.org/W3099556301","https://openalex.org/W3099892037","https://openalex.org/W3113097021","https://openalex.org/W3113104968","https://openalex.org/W3115910882","https://openalex.org/W3132320626"],"related_works":["https://openalex.org/W2027144135","https://openalex.org/W2239154762","https://openalex.org/W2184889926","https://openalex.org/W2776913024","https://openalex.org/W3107429258","https://openalex.org/W4232705780","https://openalex.org/W2965484163","https://openalex.org/W2512006651","https://openalex.org/W2954599081","https://openalex.org/W2290993309"],"abstract_inverted_index":{"When":[0],"the":[1,11,26,29,36,66,70,87,90,97,112,120,123,139,160,167,186],"chaotic":[2,71,196],"block":[3,72,197],"cryptographic":[4],"algorithms":[5],"are":[6,17,41,61,93,130,146],"performed":[7],"on":[8],"hardware":[9,193],"devices,":[10],"leakages":[12],"of":[13,28,69,78,100,183,195],"power":[14],"consumption":[15],"etc.":[16],"crucial":[18],"information":[19,68],"which":[20],"can":[21,34,188],"be":[22],"used":[23,131,147],"to":[24,63,96,110,132,148,158],"analyse":[25,65,192],"security":[27,194],"cryptosystems.":[30,198],"Template":[31],"Attack":[32],"(TA)":[33],"recover":[35],"secret":[37,161],"key.":[38],"However,":[39],"there":[40],"still":[42],"some":[43],"challenges":[44],"for":[45,116],"TA":[46,175],"such":[47],"as":[48],"irreversible":[49],"covariance":[50],"matrix":[51],"and":[52,84,126,137,153,176,191],"exponentiation":[53],"calculation":[54],"overflow.":[55],"Machine":[56],"Learning-based":[57],"Similarity":[58],"Attacks":[59],"(MLSAs)":[60],"proposed":[62,75,168],"effectively":[64],"sensitive":[67,101],"cryptosystem.":[73],"The":[74],"method":[76],"consists":[77],"three":[79],"steps:":[80],"parameter":[81,88,114],"tuning,":[82,89],"learning":[83,117,121,135],"attacking.":[85],"For":[86],"profiling":[91,124],"traces":[92,125],"categorised":[94],"according":[95],"Hamming":[98,127,155],"weights":[99],"intermediate":[102],"data.":[103],"Then":[104],"a":[105],"10-fold":[106],"cross-validation":[107],"is":[108],"executed":[109],"determine":[111],"corresponding":[113],"settings":[115],"algorithms.":[118],"In":[119],"step,":[122],"weight":[128,156],"labels":[129,157],"train":[133],"machine":[134],"models,":[136],"in":[138],"attacking":[140],"step":[141],"different":[142],"similarity":[143],"measure":[144],"methods":[145],"calculate":[149],"similarities":[150],"between":[151],"actual":[152],"hypothetical":[154],"attack":[159,190],"keys.":[162],"Performance":[163],"analyses":[164],"demonstrate":[165],"that":[166],"MLSAs":[169,187],"have":[170],"higher":[171],"success":[172],"rates":[173],"than":[174],"lower":[177],"computational":[178],"time":[179],"consumptions":[180],"under":[181],"most":[182],"scenarios.":[184],"Therefore,":[185],"efficiently":[189]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2025-10-10T00:00:00"}
