Advances and vulnerabilities in modern cryptographic techniques: A comprehensive survey on cybersecurity in the domain of machine/deep learning and quantum …

A Mehmood, A Shafique, M Alawida, AN Khan - IEEE Access, 2024 - ieeexplore.ieee.org
In the contemporary landscape, where a huge amount of data plays a vital role, the
importance of strong and robust cybersecurity measures has become increasingly …

Neural networks-based cryptography: A survey

I Meraouche, S Dutta, H Tan, K Sakurai - IEEE Access, 2021 - ieeexplore.ieee.org
A current trend of research focuses on artificial intelligence based cryptography which
although proposed almost thirty years ago could not attract much attention. Abadi and …

Responsibility gaps and black box healthcare AI: shared responsibilization as a solution

BH Lang, S Nyholm, J Blumenthal-Barby - Digital Society, 2023 - Springer
As sophisticated artificial intelligence software becomes more ubiquitously and more
intimately integrated within domains of traditionally human endeavor, many are raising …

A review of machine learning and cryptography applications

K Sooksatra, P Rivas - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
Adversarially robust neural cryptography deals with the training of a neural-based model
using an adversary to leverage the learning process in favor of reliability and …

Lightweight internet of things device authentication, encryption, and key distribution using end-to-end neural cryptosystems

Y Sun, FPW Lo, B Lo - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Device authentication, encryption, and key distribution are of vital importance to any Internet
of Things (IoT) systems, such as the new smart city infrastructures. This is due to the concern …

Linear attack on round-reduced DES using deep learning

B Hou, Y Li, H Zhao, B Wu - … : 25th European Symposium on Research in …, 2020 - Springer
Linear attack is a powerful known-plaintext cryptanalysis method on block ciphers, which
has been successfully applied in DES, KATAN, SPECK and other ciphers. In this paper, we …

Direct symbol decoding using GA-SVM in chaotic baseband wireless communication system

HP Yin, HP Ren - Journal of the Franklin Institute, 2021 - Elsevier
To retrieve the information from the serious distorted received signal is the key challenge of
communication signal processing. The chaotic baseband communication promises …

[PDF][PDF] 走向社会信息物理生产系统

景轩, 姚锡凡 - 自动化学报, 2019 - aas.net.cn
摘要随着信息物理系统(Cyber-physical system, CPS) 融合深度和融合广度的不断增加,
信息物理生产系统(Cyberphysical production system, CPPS) 呈现出显著的社会化趋势 …

Compression and encryption of heterogeneous signals for internet of medical things

P He, S Meng, Y Cui, D Wu… - IEEE Journal of …, 2023 - ieeexplore.ieee.org
Psychophysiological computing can be utilized to analyze heterogeneous physiological
signals with psychological behaviors in the Internet of Medical Things (IoMT). Since IoMT …

[PDF][PDF] A comprehensive tutorial and survey of applications of deep learning for cyber security

KP Soman, M Alazab, S Sriram - Authorea Preprints, 2023 - techrxiv.org
A Comprehensive Tutorial and Survey of Applications of Deep Learning for Cyber Security
Page 1 P osted on 5 Jan 2020 — CC-BY 4.0 — h ttps://doi.org/10.36227/tech rxiv.11473377.v1 …