Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation.
Olga TaranShideh RezaeifarTaras HolotyakSlava VoloshynovskiyPublished in: EURASIP J. Inf. Secur. (2020)
Keyphrases
- machine learning
- block cipher
- spam filters
- security protocols
- differential power analysis
- cryptographic protocols
- secure communication
- countermeasures
- data encryption standard
- cryptographic algorithms
- smart card
- protection schemes
- natural language processing
- stream cipher
- pattern recognition
- watermarking scheme
- machine learning algorithms
- text mining
- machine learning methods
- support vector machine
- active learning
- information extraction
- computer science
- network anomaly detection
- high security
- supervised learning
- digital signature
- key management
- hash functions