共 27 条
- [1] A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03): : 1646 - 1685
- [2] An S., 2021, 17 INT C COMP INT SE, P435, DOI [10.1109/CIS54983.2021.00096, DOI 10.1109/CIS54983.2021.00096]
- [3] [Anonymous], 2017, P BRIT MACH VIS C LO
- [6] Bronchain O., 2021, IACR Cryptol. ePrint Arch., V817
- [7] Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures Profiling Attacks Without Pre-processing [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017, 2017, 10529 : 45 - 68
- [8] Coron JS, 2009, LECT NOTES COMPUT SC, V5747, P156
- [9] A Second Look at the ASCAD Databases [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2022, 2022, 13211 : 75 - 99