Author of the publication

Autoencoder Assist: An Efficient Profiling Attack on High-dimensional Datasets.

, , , , , and . IACR Cryptol. ePrint Arch., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacking the Edge-of-Things: A Physical Attack Perspective., , , , , , and . IEEE Internet Things J., 9 (7): 5240-5253 (2022)Adaptive Chosen-Plaintext Collision Attack on Masked AES in Edge Computing., , , , , and . IEEE Access, (2019)Overcoming Significant Noise: Correlation-Template-Induction Attack., , , and . ISPEC, volume 7232 of Lecture Notes in Computer Science, page 393-404. Springer, (2012)Block-oriented correlation power analysis with bitwise linear leakage: An artificial intelligence approach based on genetic algorithms., , , , and . Future Gener. Comput. Syst., (2020)SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning., , , , , , and . IACR Cryptol. ePrint Arch., (2023)Efficient Framework for Genetic-Algorithm-Based Correlation Power Analysis., , , , and . IACR Cryptol. ePrint Arch., (2021)An Intelligent Multiple Sieve Method Based on Genetic Algorithm and Correlation Power Analysis., , and . IACR Cryptol. ePrint Arch., (2019)SCARE and power attack on AES-like block ciphers with secret S-box., , , , , and . Frontiers Comput. Sci., 16 (4): 164814 (2022)A machine learning based golden-free detection method for command-activated hardware Trojan., , , , , and . Inf. Sci., (2020)Autoencoder Assist: An Efficient Profiling Attack on High-Dimensional Datasets., , , , , and . ICICS, volume 13407 of Lecture Notes in Computer Science, page 324-341. Springer, (2022)