找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Crypto and AI; From Coevolution to Behrouz Zolfaghari,Hamid Nemati,Khodakhast Bibak Book 2023 The Editor(s) (if applicable) and The Author

[复制链接]
查看: 43915|回复: 41
发表于 2025-3-21 20:07:15 | 显示全部楼层 |阅读模式
书目名称Crypto and AI
副标题From Coevolution to
编辑Behrouz Zolfaghari,Hamid Nemati,Khodakhast Bibak
视频video
概述Studies the synergetic interaction of AI and crypto, leading to a coevolution process.Discusses the impact of the quantum revolution on the future of the dichotomy of AI and crypto.Investigates the in
图书封面Titlebook: Crypto and AI; From Coevolution to  Behrouz Zolfaghari,Hamid Nemati,Khodakhast Bibak Book 2023 The Editor(s) (if applicable) and The Author
描述.This book studies the intersection between cryptography and AI, highlighting the significant cross-impact and potential between the two technologies. The authors first study the individual ecosystems of cryptography and AI to show the omnipresence of each technology in the ecosystem of the other one. Next, they show how these technologies have come together in collaborative or adversarial ways. In the next section, the authors highlight the coevolution being formed between cryptography and AI. Throughout the book, the authors use evidence from state-of-the-art research to look ahead at the future of the crypto-AI dichotomy. The authors explain how they anticipate that quantum computing will join the dichotomy in near future, augmenting it to a trichotomy. They verify this through two case studies highlighting another scenario wherein crypto, AI and quantum converge. The authors study current trends in chaotic image encryption as well as information-theoretic cryptography and show how these trends lean towards quantum-inspired artificial intelligence (QiAI). After concluding the discussions, the authors suggest future research for interested researchers..
出版日期Book 2023
关键词Computational Intelligence; Data Engineering; Artificial Intelligence; Cryptography; Quantum Computing
版次1
doihttps://doi.org/10.1007/978-3-031-44807-2
isbn_softcover978-3-031-44809-6
isbn_ebook978-3-031-44807-2
copyrightThe Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl
The information of publication is updating

书目名称Crypto and AI影响因子(影响力)




书目名称Crypto and AI影响因子(影响力)学科排名




书目名称Crypto and AI网络公开度




书目名称Crypto and AI网络公开度学科排名




书目名称Crypto and AI被引频次




书目名称Crypto and AI被引频次学科排名




书目名称Crypto and AI年度引用




书目名称Crypto and AI年度引用学科排名




书目名称Crypto and AI读者反馈




书目名称Crypto and AI读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 23:01:22 | 显示全部楼层
发表于 2025-3-22 03:35:50 | 显示全部楼层
Mitchell L. Stevens,Sonia Giebelotomy deserving a comprehensive study. NNs can be used against cryptosystems; they can play roles in cryptanalysis and attacks against encryption algorithms and encrypted data. This side of the dichotomy can be interpreted as a war declared by NNs. On the other hand, NNs and cryptographic algorithms
发表于 2025-3-22 05:33:23 | 显示全部楼层
The Marketingisation of Higher Educationluenced AI (CIAI) and AI-Influenced Cryptography (AIIC). In this chapter, we focused on AIIC (ICIAI will be studied in Chapter 4). We identify and analyze the stages on the evolution path of AIIC. Moreover, we attempted to anticipate what the future may hold for AIIC given the impact of quantum comp
发表于 2025-3-22 12:28:54 | 显示全部楼层
发表于 2025-3-22 13:12:43 | 显示全部楼层
Mitchell L. Stevens,Sonia Giebelon chaotic image encryption. A comprehensive survey can highlight existing trends and shed light on less-studied topics in the area of chaotic image encryption. In addition to such a survey, this chapter studies the main challenges in this field, establishes an ecosystem for chaotic image encryption
发表于 2025-3-22 19:41:49 | 显示全部楼层
发表于 2025-3-23 01:15:51 | 显示全部楼层
Mikael Börjesson,Pablo Lillo Ceather works could be studying the ways cryptanalysis and cryptographic attacks can be conducted against encrypted NNs. Moreover, we would recommend future research investigating defensive provisions for cryptography schemes against neural attacks.
发表于 2025-3-23 02:04:19 | 显示全部楼层
发表于 2025-3-23 09:00:48 | 显示全部楼层
978-3-031-44809-6The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-7-1 06:27
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表