Formal Security Analysis of Neural Networks using Symbolic Intervals.
Shiqi WangKexin PeiJustin WhitehouseJunfeng YangSuman JanaPublished in: USENIX Security Symposium (2018)
Keyphrases
- security analysis
- neural network
- smart card
- public key
- security requirements
- high security
- formal model
- security model
- image encryption
- authentication protocol
- user authentication
- security properties
- encryption scheme
- authentication scheme
- proxy signature scheme
- private key
- information security
- mutual authentication
- software engineering