Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/series/lncs/lncs13049.bht:"
@incollection{DBLP:series/lncs/BatinaBBHJ22, author = {Lejla Batina and Shivam Bhasin and Jakub Breier and Xiaolu Hou and Dirmanto Jap}, title = {On Implementation-Level Security of Edge-Based Machine Learning Models}, booktitle = {Security and Artificial Intelligence}, pages = {335--359}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-98795-4\_14}, doi = {10.1007/978-3-030-98795-4\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/lncs/BatinaBBHJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/GanjiT22, author = {Fatemeh Ganji and Shahin Tajik}, title = {Physically Unclonable Functions and {AI} - Two Decades of Marriage}, booktitle = {Security and Artificial Intelligence}, pages = {85--106}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-98795-4\_5}, doi = {10.1007/978-3-030-98795-4\_5}, timestamp = {Mon, 02 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/GanjiT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/GarofaloSPJL22, author = {Giuseppe Garofalo and Manel Slokom and Davy Preuveneers and Wouter Joosen and Martha A. Larson}, title = {Machine Learning Meets Data Modification - The Potential of Pre-processing for Privacy Enchancement}, booktitle = {Security and Artificial Intelligence}, pages = {130--155}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-98795-4\_7}, doi = {10.1007/978-3-030-98795-4\_7}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/lncs/GarofaloSPJL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/Hernandez-Castro22, author = {Carlos Javier Hern{\'{a}}ndez{-}Castro}, title = {Machine Learning and Deep Learning for Hardware Fingerprinting}, booktitle = {Security and Artificial Intelligence}, pages = {181--213}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-98795-4\_9}, doi = {10.1007/978-3-030-98795-4\_9}, timestamp = {Mon, 02 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/Hernandez-Castro22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/Hernandez-CastroLSTJ22, author = {Carlos Javier Hern{\'{a}}ndez{-}Castro and Zhuoran Liu and Alex Serban and Ilias Tsingenopoulos and Wouter Joosen}, title = {Adversarial Machine Learning}, booktitle = {Security and Artificial Intelligence}, pages = {287--312}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-98795-4\_12}, doi = {10.1007/978-3-030-98795-4\_12}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/Hernandez-CastroLSTJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/JovicJPH22, author = {Alan Jovic and Dirmanto Jap and Louiza Papachristodoulou and Annelie Heuser}, title = {Traditional Machine Learning Methods for Side-Channel Analysis}, booktitle = {Security and Artificial Intelligence}, pages = {25--47}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-98795-4\_2}, doi = {10.1007/978-3-030-98795-4\_2}, timestamp = {Mon, 02 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/JovicJPH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/KrcekLPRWPC22, author = {Marina Krcek and Huimin Li and Servio Paguada and Unai Rioja and Lichao Wu and Guilherme Perin and Lukasz Chmielewski}, title = {Deep Learning on Side-Channel Analysis}, booktitle = {Security and Artificial Intelligence}, pages = {48--71}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-98795-4\_3}, doi = {10.1007/978-3-030-98795-4\_3}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/lncs/KrcekLPRWPC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/LiMXZ22, author = {Shaofeng Li and Shiqing Ma and Minhui Xue and Benjamin Zi Hao Zhao}, title = {Deep Learning Backdoors}, booktitle = {Security and Artificial Intelligence}, pages = {313--334}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-98795-4\_13}, doi = {10.1007/978-3-030-98795-4\_13}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/LiMXZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/MariotJBH22, author = {Luca Mariot and Domagoj Jakobovic and Thomas B{\"{a}}ck and Julio C. Hernandez{-}Castro}, title = {Artificial Intelligence for the Design of Symmetric Cryptographic Primitives}, booktitle = {Security and Artificial Intelligence}, pages = {3--24}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-98795-4\_1}, doi = {10.1007/978-3-030-98795-4\_1}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/MariotJBH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/NadeemRJV22, author = {Azqa Nadeem and Vera Rimmer and Wouter Joosen and Sicco Verwer}, title = {Intelligent Malware Defenses}, booktitle = {Security and Artificial Intelligence}, pages = {217--253}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-98795-4\_10}, doi = {10.1007/978-3-030-98795-4\_10}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/NadeemRJV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/RechbergerW22, author = {Christian Rechberger and Roman Walch}, title = {Privacy-Preserving Machine Learning Using Cryptography}, booktitle = {Security and Artificial Intelligence}, pages = {109--129}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-98795-4\_6}, doi = {10.1007/978-3-030-98795-4\_6}, timestamp = {Mon, 02 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/RechbergerW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/RimmerNVPJ22, author = {Vera Rimmer and Azqa Nadeem and Sicco Verwer and Davy Preuveneers and Wouter Joosen}, title = {Open-World Network Intrusion Detection}, booktitle = {Security and Artificial Intelligence}, pages = {254--283}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-98795-4\_11}, doi = {10.1007/978-3-030-98795-4\_11}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/RimmerNVPJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/TajikG22, author = {Shahin Tajik and Fatemeh Ganji}, title = {Artificial Neural Networks and Fault Injection Attacks}, booktitle = {Security and Artificial Intelligence}, pages = {72--84}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-98795-4\_4}, doi = {10.1007/978-3-030-98795-4\_4}, timestamp = {Mon, 02 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/TajikG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/hammeGJPJ22, author = {Tim Van hamme and Giuseppe Garofalo and Sander Joos and Davy Preuveneers and Wouter Joosen}, title = {{AI} for Biometric Authentication Systems}, booktitle = {Security and Artificial Intelligence}, pages = {156--180}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-98795-4\_8}, doi = {10.1007/978-3-030-98795-4\_8}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/lncs/hammeGJPJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/lncs/13049, editor = {Lejla Batina and Thomas B{\"{a}}ck and Ileana Buhan and Stjepan Picek}, title = {Security and Artificial Intelligence - {A} Crossdisciplinary Approach}, series = {Lecture Notes in Computer Science}, volume = {13049}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-98795-4}, doi = {10.1007/978-3-030-98795-4}, isbn = {978-3-030-98794-7}, timestamp = {Mon, 02 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/13049.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.