Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Ishak Meraouche"'
Publikováno v:
IEEE Access, Vol 10, Pp 121329-121339 (2022)
Neural networks based cryptography has seen a significant growth since the introduction of adversarial cryptography which makes use of Generative Adversarial Networks (GANs) to build neural networks that can learn encryption. The encryption has been
Externí odkaz:
https://doaj.org/article/ab91e362960346c2ba2472193bce3144
Publikováno v:
IEEE Access, Vol 9, Pp 124727-124740 (2021)
A current trend of research focuses on artificial intelligence based cryptography which although proposed almost thirty years ago could not attract much attention. Abadi and Anderson’s work on adversarial cryptography in 2016 rejuvenated the resear
Externí odkaz:
https://doaj.org/article/bcb66f2eaa4145678ee28a26a077a85b
Publikováno v:
Engineering Applications of Artificial Intelligence. 123:106220
Publikováno v:
Springer Proceedings in Mathematics & Statistics ISBN: 9789811993060
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d4af17ff74eed027ad80861e59307831
https://doi.org/10.1007/978-981-19-9307-7_6
https://doi.org/10.1007/978-981-19-9307-7_6
Autor:
Ishak Meraouche, Kouichi Sakurai
Publikováno v:
Algorithms for Intelligent Systems ISBN: 9789811663314
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c517446ed15218b84acb589f5eef1dc7
https://doi.org/10.1007/978-981-16-6332-1_58
https://doi.org/10.1007/978-981-16-6332-1_58
Publikováno v:
Advances in Internet, Data and Web Technologies ISBN: 9783030397456
EIDWT
EIDWT
The domain of Artificial Intelligence (AI) has seen an outstanding growth during the last two decades. It has proven its efficiency in handling complex domains including speech recognition, image recognition and many more. One interesting and evolvin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::34d34d69d18bf800166bce7b4de0aeae
https://doi.org/10.1007/978-3-030-39746-3_27
https://doi.org/10.1007/978-3-030-39746-3_27
Publikováno v:
Information Security Applications ISBN: 9783030652982
WISA
WISA
Steganography enables a user to hide information by embedding secret messages within other non-secret texts or pictures. Recently, research along this direction has picked a new momentum when Hayes & Danezis (NIPS 2017) used adversarial learning to g
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::38ea9bdb277fee31a81234c6e3123f9f
https://doi.org/10.1007/978-3-030-65299-9_7
https://doi.org/10.1007/978-3-030-65299-9_7