Research Article

Research and Implementation on Power Analysis Attacks for Unbalanced Data

Figure 2

SMOTE process diagram. (a) Original data. (b) SMOTE synthetic data.
(a)
(b)