Linked e-resources
Details
Table of Contents
AI for Cryptography
Artificial Intelligence for the Design of Symmetric Cryptographic Primitives
Traditional Machine Learning Methods for Side-Channel Analysis
Deep Learning on Side-Channel Analysis
Artificial Neural Networks and Fault Injection Attacks
Physically Unclonable Functions and AI: Two Decades of Marriage
AI for Authentication and Privacy
Privacy-Preserving Machine Learning using Cryptography
Machine Learning Meets Data Modification: the Potential of Pre-processing for Privacy Enhancement
AI for Biometric Authentication Systems
Machine Learning and Deep Learning for Hardware Fingerprinting. - AI for Intrusion Detection
Intelligent Malware Defenses
Open-World Network Intrusion Detection
Security of AI
Adversarial Machine Learning
Deep Learning Backdoors. - On Implementation-level Security of Edge-based Machine Learning Models.
Artificial Intelligence for the Design of Symmetric Cryptographic Primitives
Traditional Machine Learning Methods for Side-Channel Analysis
Deep Learning on Side-Channel Analysis
Artificial Neural Networks and Fault Injection Attacks
Physically Unclonable Functions and AI: Two Decades of Marriage
AI for Authentication and Privacy
Privacy-Preserving Machine Learning using Cryptography
Machine Learning Meets Data Modification: the Potential of Pre-processing for Privacy Enhancement
AI for Biometric Authentication Systems
Machine Learning and Deep Learning for Hardware Fingerprinting. - AI for Intrusion Detection
Intelligent Malware Defenses
Open-World Network Intrusion Detection
Security of AI
Adversarial Machine Learning
Deep Learning Backdoors. - On Implementation-level Security of Edge-based Machine Learning Models.