Research Article

Research and Implementation on Power Analysis Attacks for Unbalanced Data

Figure 9

Running time comparison before and after data enhancement.