{"id":"https://openalex.org/W7128433394","doi":"https://doi.org/10.1109/tifs.2026.3663053","title":"AdvScan: Black-Box Adversarial Example Detection at Runtime Through Power Analysis","display_name":"AdvScan: Black-Box Adversarial Example Detection at Runtime Through Power Analysis","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7128433394","doi":"https://doi.org/10.1109/tifs.2026.3663053"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2026.3663053","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3663053","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026885733","display_name":"Robi Paul","orcid":"https://orcid.org/0000-0002-7367-8432"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Robi Paul","raw_affiliation_strings":["Rochester Institute of Technology, Rochester, NY, USA"],"affiliations":[{"raw_affiliation_string":"Rochester Institute of Technology, Rochester, NY, USA","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077915520","display_name":"Michael Zuzak","orcid":"https://orcid.org/0000-0003-0356-9393"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael Zuzak","raw_affiliation_strings":["Rochester Institute of Technology, Rochester, NY, USA"],"affiliations":[{"raw_affiliation_string":"Rochester Institute of Technology, Rochester, NY, USA","institution_ids":["https://openalex.org/I155173764"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5026885733"],"corresponding_institution_ids":["https://openalex.org/I155173764"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.7348353,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"2102","last_page":"2115"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.6991000175476074,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.6991000175476074,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.1395999938249588,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.050599999725818634,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6144000291824341},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.576200008392334},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.527400016784668},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.49950000643730164},{"id":"https://openalex.org/keywords/gradient-descent","display_name":"Gradient descent","score":0.4357999861240387},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.4004000127315521},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.3700000047683716},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.3668000102043152},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.34060001373291016},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3357999920845032}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8483999967575073},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6144000291824341},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.576200008392334},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.527400016784668},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.49950000643730164},{"id":"https://openalex.org/C153258448","wikidata":"https://www.wikidata.org/wiki/Q1199743","display_name":"Gradient descent","level":3,"score":0.4357999861240387},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.414900004863739},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.4004000127315521},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.38749998807907104},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.3700000047683716},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.3668000102043152},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3546000123023987},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.34060001373291016},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3357999920845032},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.32710000872612},{"id":"https://openalex.org/C128942645","wikidata":"https://www.wikidata.org/wiki/Q1568346","display_name":"Test case","level":3,"score":0.3010999858379364},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.29980000853538513},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.28999999165534973},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2897000014781952},{"id":"https://openalex.org/C184992742","wikidata":"https://www.wikidata.org/wiki/Q7243229","display_name":"Prime (order theory)","level":2,"score":0.28679999709129333},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.2842000126838684},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.28200000524520874},{"id":"https://openalex.org/C149441793","wikidata":"https://www.wikidata.org/wiki/Q200726","display_name":"Probability distribution","level":2,"score":0.28139999508857727},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.2784000039100647},{"id":"https://openalex.org/C96608239","wikidata":"https://www.wikidata.org/wiki/Q1199823","display_name":"Statistical power","level":2,"score":0.27619999647140503},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.273499995470047},{"id":"https://openalex.org/C3020028006","wikidata":"https://www.wikidata.org/wiki/Q9158","display_name":"Electronic mail","level":2,"score":0.26969999074935913},{"id":"https://openalex.org/C87007009","wikidata":"https://www.wikidata.org/wiki/Q210832","display_name":"Statistical hypothesis testing","level":2,"score":0.2671000063419342},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2612999975681305},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.2596000134944916},{"id":"https://openalex.org/C139676723","wikidata":"https://www.wikidata.org/wiki/Q1193832","display_name":"Sign (mathematics)","level":2,"score":0.2558000087738037},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.2515999972820282},{"id":"https://openalex.org/C106516650","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm design","level":2,"score":0.2513999938964844}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2026.3663053","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3663053","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1562542037","https://openalex.org/W2074466695","https://openalex.org/W2509835792","https://openalex.org/W2561975083","https://openalex.org/W2618043096","https://openalex.org/W2942091739","https://openalex.org/W2963485691","https://openalex.org/W2963857521","https://openalex.org/W2977790487","https://openalex.org/W2986013765","https://openalex.org/W3021182036","https://openalex.org/W3127696688","https://openalex.org/W3174102408","https://openalex.org/W3176502563","https://openalex.org/W3211999566","https://openalex.org/W3214052054","https://openalex.org/W3216772124","https://openalex.org/W4221165735","https://openalex.org/W4226135488","https://openalex.org/W4242136584","https://openalex.org/W4293846201","https://openalex.org/W4366724916","https://openalex.org/W4381708600","https://openalex.org/W4382565749","https://openalex.org/W4383221534","https://openalex.org/W4383751021","https://openalex.org/W4388718429","https://openalex.org/W4389331428","https://openalex.org/W4390679865","https://openalex.org/W4390839235","https://openalex.org/W4391326543","https://openalex.org/W4393212485","https://openalex.org/W4403182775","https://openalex.org/W4403997791","https://openalex.org/W4407476474","https://openalex.org/W4408441640","https://openalex.org/W4412082534"],"related_works":[],"abstract_inverted_index":{"TinyML":[0,226],"models":[1,180],"deployed":[2],"on":[3,49,67,100,175,182],"edge":[4],"devices":[5],"are":[6,24],"increasingly":[7],"adopted":[8],"in":[9,43,88,110,228],"safety/security-critical":[10],"applications,":[11],"making":[12],"them":[13],"a":[14,78,89,120,134,140],"prime":[15],"target":[16,184],"for":[17,83,223],"adversarial":[18,158],"example":[19,159],"(AE)":[20,160],"attacks":[21],"where":[22],"inputs":[23],"modified":[25],"to":[26,137],"cause":[27],"misclassifications.":[28],"However,":[29],"existing":[30],"AE":[31,84,221],"detection":[32,85,222],"methods":[33],"either":[34],"require":[35],"white-box":[36],"model":[37],"access,":[38],"which":[39],"is":[40,98],"often":[41,60],"unavailable":[42],"licensed":[44],"black-box":[45,90,229],"deployments,":[46],"or":[47],"rely":[48],"input":[50],"pre-processing":[51],"stages":[52],"that":[53,86,103],"add":[54],"non-trivial":[55],"latency":[56],"and":[57,92,172,190,210],"resource":[58],"overhead,":[59],"exceeding":[61],"what":[62],"mission-critical":[63],"applications":[64],"can":[65],"afford":[66],"their":[68],"inference":[69],"path.":[70],"To":[71],"address":[72],"these":[73],"challenges,":[74],"we":[75],"propose":[76],"AdvScan,":[77],"runtime":[79],"power":[80,124,143],"analysis-based":[81],"methodology":[82],"operates":[87],"scenario":[91],"while":[93],"inducing":[94],"minimal":[95],"latency.":[96],"AdvS-can":[97],"based":[99],"the":[101,186,217],"observation":[102],"AEs":[104,204],"produce":[105],"anomalous":[106],"neuron":[107],"activations,":[108],"which,":[109],"turn,":[111],"generate":[112],"distinctive":[113],"power-consumption":[114],"signatures.":[115],"The":[116],"algorithm":[117],"initially":[118],"constructs":[119],"baseline":[121],"distribution":[122],"of":[123,203,219],"signatures":[125],"from":[126,147],"known":[127],"benign":[128],"inputs,":[129,199],"then,":[130],"at":[131],"runtime,":[132],"applies":[133],"one-sample":[135],"t-test":[136],"determine":[138],"whether":[139],"test":[141,198],"input\u2019s":[142],"signature":[144],"significantly":[145],"deviates":[146],"this":[148],"baseline,":[149],"thereby":[150],"detecting":[151],"AEs.":[152],"We":[153],"evaluated":[154],"AdvScan":[155,200],"using":[156],"three":[157,176],"generation":[161],"algorithms":[162],"(Fast":[163],"Gradient":[164,169],"Sign":[165],"Method":[166],"(FGSM),":[167],"Projected":[168],"Descent":[170],"(PGD),":[171],"Carlini\u2013Wagner":[173],"(C&W))":[174],"MLPerf":[177],"Tiny":[178],"benchmark":[179],"implemented":[181],"two":[183],"devices:":[185],"STM32F303RC":[187],"(ARM":[188,192],"Cortex-M4)":[189],"STM32L562RE":[191],"Cortex-M33)":[193],"microcontrollers.":[194],"Across":[195],"318,400":[196],"total":[197],"detects":[201],"99.984%":[202],"with":[205],"only":[206],"40":[207],"false":[208,212],"negatives":[209],"zero":[211],"positives.":[213],"These":[214],"results":[215],"demonstrate":[216],"viability":[218],"power-based":[220],"secure,":[224],"accuracy-critical":[225],"deployments":[227],"environments.":[230]},"counts_by_year":[],"updated_date":"2026-02-23T20:09:44.859080","created_date":"2026-02-10T00:00:00"}
