Research Article
Convolution Neural Network-Based Sensitive Security Parameter Identification and Analysis
Figure 8
Image samples of each trace. Unlike when the output bit streams in Section 4.1 were imaged, the images of the traces were uncharacteristic. Therefore, it is impossible to identify with the naked eye.