


default search action
Security and Artificial Intelligence 2022
- Lejla Batina
, Thomas Bäck
, Ileana Buhan, Stjepan Picek
:
Security and Artificial Intelligence - A Crossdisciplinary Approach. Lecture Notes in Computer Science 13049, Springer 2022, ISBN 978-3-030-98794-7
AI for Cryptography
- Luca Mariot, Domagoj Jakobovic, Thomas Bäck
, Julio C. Hernandez-Castro:
Artificial Intelligence for the Design of Symmetric Cryptographic Primitives. 3-24 - Alan Jovic, Dirmanto Jap, Louiza Papachristodoulou, Annelie Heuser:
Traditional Machine Learning Methods for Side-Channel Analysis. 25-47 - Marina Krcek, Huimin Li, Servio Paguada, Unai Rioja
, Lichao Wu, Guilherme Perin, Lukasz Chmielewski:
Deep Learning on Side-Channel Analysis. 48-71 - Shahin Tajik, Fatemeh Ganji:
Artificial Neural Networks and Fault Injection Attacks. 72-84 - Fatemeh Ganji, Shahin Tajik:
Physically Unclonable Functions and AI - Two Decades of Marriage. 85-106
AI for Authentication and Privacy
- Christian Rechberger, Roman Walch:
Privacy-Preserving Machine Learning Using Cryptography. 109-129 - Giuseppe Garofalo
, Manel Slokom
, Davy Preuveneers, Wouter Joosen, Martha A. Larson:
Machine Learning Meets Data Modification - The Potential of Pre-processing for Privacy Enchancement. 130-155 - Tim Van hamme, Giuseppe Garofalo
, Sander Joos
, Davy Preuveneers, Wouter Joosen:
AI for Biometric Authentication Systems. 156-180 - Carlos Javier Hernández-Castro:
Machine Learning and Deep Learning for Hardware Fingerprinting. 181-213
AI for Intrusion Detection
- Azqa Nadeem
, Vera Rimmer, Wouter Joosen, Sicco Verwer:
Intelligent Malware Defenses. 217-253 - Vera Rimmer, Azqa Nadeem
, Sicco Verwer, Davy Preuveneers, Wouter Joosen:
Open-World Network Intrusion Detection. 254-283
Security of AI
- Carlos Javier Hernández-Castro, Zhuoran Liu, Alex Serban, Ilias Tsingenopoulos, Wouter Joosen:
Adversarial Machine Learning. 287-312 - Shaofeng Li, Shiqing Ma, Minhui Xue
, Benjamin Zi Hao Zhao:
Deep Learning Backdoors. 313-334 - Lejla Batina, Shivam Bhasin, Jakub Breier
, Xiaolu Hou, Dirmanto Jap:
On Implementation-Level Security of Edge-Based Machine Learning Models. 335-359

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.