[HTML][HTML] Chaotic image encryption: state-of-the-art, ecosystem, and future roadmap

B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
Recently, many researchers have been interested in the application of chaos in
cryptography. Specifically, numerous research works have been focusing on chaotic image …

A review of machine learning algorithms for fraud detection in credit card transaction

KS Lim, LH Lee, YW Sim - … Journal of Computer Science & Network …, 2021 - koreascience.kr
The increasing number of credit card fraud cases has become a considerable problem since
the past decades. This phenomenon is due to the expansion of new technologies, including …

The dichotomy of cloud and iot: Cloud-assisted iot from a security perspective

B Zolfaghari, A Yazdinejad, A Dehghantanha… - arxiv preprint arxiv …, 2022 - arxiv.org
In recent years, the existence of a significant cross-impact between Cloud computing and
Internet of Things (IoT) has lead to a dichotomy that gives raise to Cloud-Assisted IoT …

[HTML][HTML] The dichotomy of neural networks and cryptography: War and peace

B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
In recent years, neural networks and cryptographic schemes have come together in war and
peace; a cross-impact that forms a dichotomy deserving a comprehensive review study …

Crypto makes AI evolve

B Zolfaghari, H Nemati, N Yanai, K Bibak - Crypto and AI: From …, 2023 - Springer
Adopting cryptography has given rise to a significant? evolution in AI. This chapter studies
the path and stages of this evolution. We start with reviewing existing relevant surveys …

[HTML][HTML] AI makes crypto evolve

B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
The recent literature reveals a dichotomy formed by a coevolution between cryptography
and Artificial Intelligence (AI). This dichotomy consists of two sides, namely Crypto …

A tradeoff paradigm shift in cryptographically-secure pseudorandom number generation based on discrete logarithm

T Koshiba, B Zolfaghari, K Bibak - Journal of Information Security and …, 2023 - Elsevier
Discrete logarithmic pseudorandom number generators are a prevailing class of
cryptographically-secure pseudorandom number generators (CSPRNGs). In generators of …

The Dichotomy of Crypto and NN: War and Peace

B Zolfaghari, H Nemati, N Yanai, K Bibak - Crypto and AI: From …, 2023 - Springer
In recent years, NNs, as the basic components in AI models and cryptographic schemes,
have come together in war and peace; a cross-impact forms a dichotomy deserving a …

Chaotic Map Based Raster Data Encryption for Geospatial Data.

P Bhangale, S Vaikole - International Journal of Safety & …, 2023 - search.ebscohost.com
Data confidentiality, security authentication are just some of the many uses for image
encryption, making it one of the most effective methods for safeguarding geospatial data …

Chaotic Image Encryption: State-of-the-Art, Ecosystem, and the Promise of Quantum-Inspired AI

B Zolfaghari, H Nemati, N Yanai, K Bibak - Crypto and AI: From …, 2023 - Springer
Recently, many researchers have been interested in the application of chaos in
cryptography. Specifically, numerous research works have been focusing on chaotic image …