Sign in

Adversarial Attack Protection Scalar Multiplication for WSNs Resistance Machine-Learning Side-channel Attack.

Weizhong Yang
Published in: ACM Trans. Sens. Networks (2022)
Keyphrases
  • countermeasures
  • machine learning
  • power analysis
  • information security
  • secret key
  • wireless sensor networks
  • elliptic curve
  • reinforcement learning
  • energy consumption
  • authentication protocol