Search dblp for Publications

export results for "toc:db/series/lncs/lncs13049.bht:"

 download as .bib file

@incollection{DBLP:series/lncs/BatinaBBHJ22,
  author       = {Lejla Batina and
                  Shivam Bhasin and
                  Jakub Breier and
                  Xiaolu Hou and
                  Dirmanto Jap},
  title        = {On Implementation-Level Security of Edge-Based Machine Learning Models},
  booktitle    = {Security and Artificial Intelligence},
  pages        = {335--359},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-98795-4\_14},
  doi          = {10.1007/978-3-030-98795-4\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/lncs/BatinaBBHJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/GanjiT22,
  author       = {Fatemeh Ganji and
                  Shahin Tajik},
  title        = {Physically Unclonable Functions and {AI} - Two Decades of Marriage},
  booktitle    = {Security and Artificial Intelligence},
  pages        = {85--106},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-98795-4\_5},
  doi          = {10.1007/978-3-030-98795-4\_5},
  timestamp    = {Mon, 02 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/GanjiT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/GarofaloSPJL22,
  author       = {Giuseppe Garofalo and
                  Manel Slokom and
                  Davy Preuveneers and
                  Wouter Joosen and
                  Martha A. Larson},
  title        = {Machine Learning Meets Data Modification - The Potential of Pre-processing
                  for Privacy Enchancement},
  booktitle    = {Security and Artificial Intelligence},
  pages        = {130--155},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-98795-4\_7},
  doi          = {10.1007/978-3-030-98795-4\_7},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/lncs/GarofaloSPJL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/Hernandez-Castro22,
  author       = {Carlos Javier Hern{\'{a}}ndez{-}Castro},
  title        = {Machine Learning and Deep Learning for Hardware Fingerprinting},
  booktitle    = {Security and Artificial Intelligence},
  pages        = {181--213},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-98795-4\_9},
  doi          = {10.1007/978-3-030-98795-4\_9},
  timestamp    = {Mon, 02 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/Hernandez-Castro22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/Hernandez-CastroLSTJ22,
  author       = {Carlos Javier Hern{\'{a}}ndez{-}Castro and
                  Zhuoran Liu and
                  Alex Serban and
                  Ilias Tsingenopoulos and
                  Wouter Joosen},
  title        = {Adversarial Machine Learning},
  booktitle    = {Security and Artificial Intelligence},
  pages        = {287--312},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-98795-4\_12},
  doi          = {10.1007/978-3-030-98795-4\_12},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/Hernandez-CastroLSTJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/JovicJPH22,
  author       = {Alan Jovic and
                  Dirmanto Jap and
                  Louiza Papachristodoulou and
                  Annelie Heuser},
  title        = {Traditional Machine Learning Methods for Side-Channel Analysis},
  booktitle    = {Security and Artificial Intelligence},
  pages        = {25--47},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-98795-4\_2},
  doi          = {10.1007/978-3-030-98795-4\_2},
  timestamp    = {Mon, 02 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/JovicJPH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/KrcekLPRWPC22,
  author       = {Marina Krcek and
                  Huimin Li and
                  Servio Paguada and
                  Unai Rioja and
                  Lichao Wu and
                  Guilherme Perin and
                  Lukasz Chmielewski},
  title        = {Deep Learning on Side-Channel Analysis},
  booktitle    = {Security and Artificial Intelligence},
  pages        = {48--71},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-98795-4\_3},
  doi          = {10.1007/978-3-030-98795-4\_3},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/lncs/KrcekLPRWPC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/LiMXZ22,
  author       = {Shaofeng Li and
                  Shiqing Ma and
                  Minhui Xue and
                  Benjamin Zi Hao Zhao},
  title        = {Deep Learning Backdoors},
  booktitle    = {Security and Artificial Intelligence},
  pages        = {313--334},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-98795-4\_13},
  doi          = {10.1007/978-3-030-98795-4\_13},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/LiMXZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/MariotJBH22,
  author       = {Luca Mariot and
                  Domagoj Jakobovic and
                  Thomas B{\"{a}}ck and
                  Julio C. Hernandez{-}Castro},
  title        = {Artificial Intelligence for the Design of Symmetric Cryptographic
                  Primitives},
  booktitle    = {Security and Artificial Intelligence},
  pages        = {3--24},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-98795-4\_1},
  doi          = {10.1007/978-3-030-98795-4\_1},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/MariotJBH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/NadeemRJV22,
  author       = {Azqa Nadeem and
                  Vera Rimmer and
                  Wouter Joosen and
                  Sicco Verwer},
  title        = {Intelligent Malware Defenses},
  booktitle    = {Security and Artificial Intelligence},
  pages        = {217--253},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-98795-4\_10},
  doi          = {10.1007/978-3-030-98795-4\_10},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/NadeemRJV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/RechbergerW22,
  author       = {Christian Rechberger and
                  Roman Walch},
  title        = {Privacy-Preserving Machine Learning Using Cryptography},
  booktitle    = {Security and Artificial Intelligence},
  pages        = {109--129},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-98795-4\_6},
  doi          = {10.1007/978-3-030-98795-4\_6},
  timestamp    = {Mon, 02 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/RechbergerW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/RimmerNVPJ22,
  author       = {Vera Rimmer and
                  Azqa Nadeem and
                  Sicco Verwer and
                  Davy Preuveneers and
                  Wouter Joosen},
  title        = {Open-World Network Intrusion Detection},
  booktitle    = {Security and Artificial Intelligence},
  pages        = {254--283},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-98795-4\_11},
  doi          = {10.1007/978-3-030-98795-4\_11},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/RimmerNVPJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/TajikG22,
  author       = {Shahin Tajik and
                  Fatemeh Ganji},
  title        = {Artificial Neural Networks and Fault Injection Attacks},
  booktitle    = {Security and Artificial Intelligence},
  pages        = {72--84},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-98795-4\_4},
  doi          = {10.1007/978-3-030-98795-4\_4},
  timestamp    = {Mon, 02 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/TajikG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/hammeGJPJ22,
  author       = {Tim Van hamme and
                  Giuseppe Garofalo and
                  Sander Joos and
                  Davy Preuveneers and
                  Wouter Joosen},
  title        = {{AI} for Biometric Authentication Systems},
  booktitle    = {Security and Artificial Intelligence},
  pages        = {156--180},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-98795-4\_8},
  doi          = {10.1007/978-3-030-98795-4\_8},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/lncs/hammeGJPJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/lncs/13049,
  editor       = {Lejla Batina and
                  Thomas B{\"{a}}ck and
                  Ileana Buhan and
                  Stjepan Picek},
  title        = {Security and Artificial Intelligence - {A} Crossdisciplinary Approach},
  series       = {Lecture Notes in Computer Science},
  volume       = {13049},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-98795-4},
  doi          = {10.1007/978-3-030-98795-4},
  isbn         = {978-3-030-98794-7},
  timestamp    = {Mon, 02 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/13049.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics