PDF下载 分享
[1]罗凯文,王 敏,王 燚,等.基于改进卷积自编码器的侧信道数据预处理[J].成都信息工程大学学报,2025,40(01):49-55.[doi:10.16836/j.cnki.jcuit.2025.01.008]
 LUO Kaiwen,WANG Min,WANG Yi,et al.Side-Channel Data Preprocessing using Enhanced Convolutional Autoencoders[J].Journal of Chengdu University of Information Technology,2025,40(01):49-55.[doi:10.16836/j.cnki.jcuit.2025.01.008]
点击复制

基于改进卷积自编码器的侧信道数据预处理

参考文献/References:

[1] Mangard S,Oswald E,Popp T.Power analysis attacks: Revealing the secrets of smart cards[M].Springer Science & Business Media,2008.
[2] Kocher P,Jaffe J,Jun B.Differential power analysis[C].Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology Conference Santa Barbara,California,USA,August 15-19,1999 Proceedings 19.Springer Berlin Heidelberg,1999:388-397.
[3] Feng H,Lin W,Shang W.Mlp and cnn-based classification for points of interest in side-channel attacks[C].2019 IEEE/ACIS 18th International Conference onComputer and Information Science(ICIS).IEEE,2019: 456-460.
[4] Brier E,Clavier C,Olivier F.Correlation power analysis with a leakage model[C].Cryptographic Hardware and Embedded Systems-CHES 2004: 6th International Workshop Cambridge,MA,USA,August11-13,2004.Proceedings 6.Springer Berlin Heidelberg,2004: 16-29.
[5] Gierlichs B,Batina L,Preneel B,et al.Revisiting higher-order DPA attacks: Multivariate mutual information analysis[C].Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Trackat the RSA Conference 2010,San Francisco,CA,USA,March 1-5,2010.Proceedings.Springer Berlin Heidelberg,2010: 221-234.
[6] Chari S,Rao J R,Rohatgi P.Template attacks[C].Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International Workshop Redwood Shores,CA,USA,August 13–15,2002 Revised Papers 4.Springer Berlin Heidelberg,2003: 13-28.
[7] Wold S,Esbensen K,Geladi P.Principal component analysis[J].Chemometrics and intelligent laboratory systems,1987,2(1-3): 37-52.
[8] Souissi Y,Nassar M,Guilley S,et al.First principal components analysis:a new side channel distinguisher[C].Information Security and Cryptology-ICISC 2010:13th International Conference,Seoul,Korea,December 1-3,2010,Revised Selected Papers 13.Springer Berlin Heidelberg,2011:407-419.
[9] Standaert F X,Archambeau C.Using subspace-based template attacks to compare and combine power and electromagnetic information leakages[C].International Workshop on Cryptographic Hardware and Embedded Systems.Berlin,Heidelberg: Springer Berlin Heidelberg,2008: 411-425.
[10] Bruneau N,Guilley S,Heuser A,et al.Less is more: dimensionality reduction from a theoretical perspective[C].Cryptographic Hardware and Embedded Systems—CHES 2015:17th International Workshop,Saint-Malo,France,September 13-16,2015,Proceedings 17.Springer Berlin Heidelberg,2015: 22-41.
[11] Cagli E,Dumas C,Prouff E.Enhancing dimensionality reduction methods for side-channel attacks[C].Smart Card Research and Advanced Applications: 14th International Conference,CARDIS 2015,Bochum,Germany,November 4-6,2015.Revised Selected Papers 14.Springer International Publishing,2016: 15-33.
[12] Mukhtar N,Fournaris A P,Khan T M,et al.Improved hybrid approach for side-channel analysis using efficient convolutional neural network and dimensionality reduction[J].IEEE Access,2020,8: 184298-184311.
[13] Kwon D,Kim H,Hong S.Non-profiled deep learning-based side-channel preprocessing with autoencoders[J].IEEE Access,2021,9: 57692-57703.
[14] Wu L,Picek S.Remove some noise: On pre-processing of side-channel measurements with autoencoders[J].IACR Transactions on Cryptographic Hardware and Embedded Systems,2020: 389-415.
[15] Benadjila R,Prouff E,Strullu R,et al.Deep learning for side-channel analysis and introduction to ASCAD database[J].Journal of Cryptographic Engineering,2020,10(2): 163-188.
[16] 张国梁,郭晓军.基于自编码器的网络异常检测研究综述[J].Journal of Cyber Security 信息安全学报,2023,8(2).
[17] Luthra A,Sulakhe H,Mittal T,et al.Eformer: Edge enhancement based transformer for medical image denoising[J].arXiv preprint arXiv:2109.08044,2021.
[18] Bhasin S,Danger J L,Guilley S,et al.NICV: normalized inter-class variance for detection of side-channel leakage[C].2014 International Symposium on Electromagnetic Compatibility,Tokyo.IEEE,2014: 310-313.
[19] Standaert F X,Malkin T G,Yung M.A unified framework for the analysis of side-channel key recovery attacks[C].Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques,Cologne,Germany,April 26-30,2009.Proceedings 28.Springer Berlin Heidelberg,2009: 443-461.

相似文献/References:

[1]卢 丽,许源平,卢 军,等.基于社会力异常检测改进算法的人群行为模型[J].成都信息工程大学学报,2018,(01):1.[doi:10.16836/j.cnki.jcuit.2018.01.001]
 LU Li,XU Yuan-ping,LU Jun,et al.A Crowd Behavior Model based on an ImprovedSocial Force Anomaly Detection Algorithm[J].Journal of Chengdu University of Information Technology,2018,(01):1.[doi:10.16836/j.cnki.jcuit.2018.01.001]
[2]胡 婕,陶宏才.基于深度学习的领域问答系统的设计与实现[J].成都信息工程大学学报,2019,(03):232.[doi:10.16836/j.cnki.jcuit.2019.03.004]
 HU Jie,TAO Hongcai.Design and Implementation of Domain Question Answering System based on Deep Learning[J].Journal of Chengdu University of Information Technology,2019,(01):232.[doi:10.16836/j.cnki.jcuit.2019.03.004]
[3]王 强,李孝杰,陈 俊.基于He-Net的卷积神经网络算法的图像分类研究[J].成都信息工程大学学报,2017,(05):503.[doi:10.16836/j.cnki.jcuit.2017.05.007]
 WANG Qing,LI Xiao-jie,CHEN Jun.Research on Image Classification based on HE-Net Convolutional Neural Networks[J].Journal of Chengdu University of Information Technology,2017,(01):503.[doi:10.16836/j.cnki.jcuit.2017.05.007]
[4]冉元波,孙 敏,高梦清,等.双偏振天气雷达水凝物识别研究[J].成都信息工程大学学报,2017,(06):590.[doi:10.16836/j.cnki.jcuit.2017.06.003]
 RAN Yuan-bo,SUN Min,GAO Meng-qing,et al.Study on Hydrometeor Identification based on Deep Learning[J].Journal of Chengdu University of Information Technology,2017,(01):590.[doi:10.16836/j.cnki.jcuit.2017.06.003]
[5]黄 洁,王 燚.适用于侧信道分析的卷积神经网络结构的实验研究[J].成都信息工程大学学报,2019,(05):449.[doi:10.16836/j.cnki.jcuit.2019.05.001]
 HUANG Jie,WANG Yi.Experimental Study on the Structure of Convolutional Neural Network Suitable for Side Channel Analysis[J].Journal of Chengdu University of Information Technology,2019,(01):449.[doi:10.16836/j.cnki.jcuit.2019.05.001]
[6]周 咏,万 垚.基于无人机的监控系统设计[J].成都信息工程大学学报,2021,36(02):159.[doi:10.16836/j.cnki.jcuit.2021.02.006]
 ZHOU Yong,WAN Yao.Design of Surveillance System based on UAV[J].Journal of Chengdu University of Information Technology,2021,36(01):159.[doi:10.16836/j.cnki.jcuit.2021.02.006]
[7]谭诗雨,杨 玲,师春香,等.复杂背景下银行卡号识别方法研究[J].成都信息工程大学学报,2021,36(03):280.[doi:10.16836/j.cnki.jcuit.2021.03.007]
 TAN Shiyu,YANG Ling,SHI Chunxiang,et al.Bank Card Number Recognition System under the Complex Background based on Deep Learning[J].Journal of Chengdu University of Information Technology,2021,36(01):280.[doi:10.16836/j.cnki.jcuit.2021.03.007]
[8]郭楠馨,林宏刚,张运理,等.基于元学习的僵尸网络检测研究[J].成都信息工程大学学报,2022,37(06):615.[doi:10.16836/j.cnki.jcuit.2022.06.001]
 GUO Nanxin,LIN Honggang,ZHANG Yunli,et al.Botnet Detection Method based on Meta-Learning Network[J].Journal of Chengdu University of Information Technology,2022,37(01):615.[doi:10.16836/j.cnki.jcuit.2022.06.001]
[9]李 静,鲜 林,王海江.基于YOLOv3的船只检测算法研究[J].成都信息工程大学学报,2023,38(01):37.[doi:10.16836/j.cnki.jcuit.2023.01.006]
 LI Jing,XIAN Lin,WANG Haijiang.Research on Ship Detection Algorithm based on YOLOv3[J].Journal of Chengdu University of Information Technology,2023,38(01):37.[doi:10.16836/j.cnki.jcuit.2023.01.006]
[10]毛 波,杨 昊,周世杰,等.基于CMA-REPS格点预报数据的深度学习风速订正方法[J].成都信息工程大学学报,2023,38(03):264.[doi:10.16836/j.cnki.jcuit.2023.03.003]
 MAO Bo,YANG Hao,ZHOU Shijie,et al.A Deep Learning Method for Wind Speed Grid Point Forecasting Data Correction based on CMA-REPS[J].Journal of Chengdu University of Information Technology,2023,38(01):264.[doi:10.16836/j.cnki.jcuit.2023.03.003]

备注/Memo

收稿日期:2023-08-07

更新日期/Last Update: 2025-02-28