Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Ishak Meraouche"'
Publikováno v:
IEEE Access, Vol 10, Pp 121329-121339 (2022)
Neural networks based cryptography has seen a significant growth since the introduction of adversarial cryptography which makes use of Generative Adversarial Networks (GANs) to build neural networks that can learn encryption. The encryption has been
Externí odkaz:
https://doaj.org/article/ab91e362960346c2ba2472193bce3144
Publikováno v:
IEEE Access, Vol 9, Pp 124727-124740 (2021)
A current trend of research focuses on artificial intelligence based cryptography which although proposed almost thirty years ago could not attract much attention. Abadi and Anderson’s work on adversarial cryptography in 2016 rejuvenated the resear
Externí odkaz:
https://doaj.org/article/bcb66f2eaa4145678ee28a26a077a85b
Publikováno v:
Engineering Applications of Artificial Intelligence. 123:106220
Publikováno v:
Springer Proceedings in Mathematics & Statistics ISBN: 9789811993060
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d4af17ff74eed027ad80861e59307831
https://doi.org/10.1007/978-981-19-9307-7_6
https://doi.org/10.1007/978-981-19-9307-7_6
Autor:
Ishak Meraouche, Kouichi Sakurai
Publikováno v:
Algorithms for Intelligent Systems ISBN: 9789811663314
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c517446ed15218b84acb589f5eef1dc7
https://doi.org/10.1007/978-981-16-6332-1_58
https://doi.org/10.1007/978-981-16-6332-1_58
Publikováno v:
Advances in Internet, Data and Web Technologies ISBN: 9783030397456
EIDWT
EIDWT
The domain of Artificial Intelligence (AI) has seen an outstanding growth during the last two decades. It has proven its efficiency in handling complex domains including speech recognition, image recognition and many more. One interesting and evolvin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::34d34d69d18bf800166bce7b4de0aeae
https://doi.org/10.1007/978-3-030-39746-3_27
https://doi.org/10.1007/978-3-030-39746-3_27
Publikováno v:
Information Security Applications ISBN: 9783030652982
WISA
WISA
Steganography enables a user to hide information by embedding secret messages within other non-secret texts or pictures. Recently, research along this direction has picked a new momentum when Hayes & Danezis (NIPS 2017) used adversarial learning to g
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::38ea9bdb277fee31a81234c6e3123f9f
https://doi.org/10.1007/978-3-030-65299-9_7
https://doi.org/10.1007/978-3-030-65299-9_7
Publikováno v:
In Engineering Applications of Artificial Intelligence August 2023 123 Part B
Autor:
B. Rushi Kumar, S. Ponnusamy, Debasis Giri, Bhavani Thuraisingham, Christopher W. Clifton, Barbara Carminati
This book comprises select peer-reviewed articles submitted for the proceedings of the International Conference on Mathematics and Computing (ICMC 2022), held by the School of Advanced Sciences, Vellore Institute of Technology, Vellore, India, in as
This book gathers outstanding research papers presented in the 2nd International Conference on Artificial Intelligence: Advances and Application (ICAIAA 2021), held in Poornima College of Engineering, Jaipur, India during 27-28 March 2021. This book