To see the other types of publications on this topic, follow the link: AI security.

Dissertations / Theses on the topic 'AI security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 26 dissertations / theses for your research on the topic 'AI security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Djaidja, Taki Eddine Toufik. "Advancing the Security of 5G and Beyond Vehicular Networks through AI/DL." Electronic Thesis or Diss., Bourgogne Franche-Comté, 2024. http://www.theses.fr/2024UBFCK009.

Full text
Abstract:
L'émergence des réseaux de cinquième génération (5G) et des réseaux véhiculaire (V2X) a ouvert une ère de connectivité et de services associés sans précédent. Ces réseaux permettent des interactions fluides entre les véhicules, l'infrastructure, et bien plus encore, en fournissant une gamme de services à travers des tranches de réseau (slices), chacune adaptée aux besoins spécifiques de ceux-ci. Les générations futures sont même censées apporter de nouvelles avancées à ces réseaux. Cependant, ce progrès remarquable les expose à une multitude de menaces en matière de cybersécurité, dont bon nom
APA, Harvard, Vancouver, ISO, and other styles
2

Hatoum, Makram. "Digital watermarking for PDF documents and images : security, robustness and AI-based attack." Thesis, Bourgogne Franche-Comté, 2020. http://www.theses.fr/2020UBFCD016.

Full text
Abstract:
Le développement technologique a ses avantages et ses inconvénients. Nous pouvons facilement partager et télécharger du contenu numérique en utilisant l’Internet. En outre, les utilisateurs malveillants peuvent aussi modifier, dupliquer et diffuser illégalement tout type d'informations, comme des images et des documents. Par conséquent, nous devons protéger ces contenus et arrêter les pirates. Le but de cette thèse est de protéger les documents PDF et les images en utilisant la technique de tatouage numérique Spread Transform Dither Modulation (STDM), tout en tenant compte des exigences princi
APA, Harvard, Vancouver, ISO, and other styles
3

Radosavljevic, Bojan, and Axel Kimblad. "Etik och säkerhet när AI möter IoT." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20613.

Full text
Abstract:
I dagens samhälle går den tekniska utvecklingen fort framåt. Artificiell intelligens och Internet of Things är två tekniker inom utvecklingen vars popularitet har ökat på senare tid. Dessa tekniker i integration har visat sig kunna bidra med stora verksamhetsnyttor, bland annat i form av ökad precishet vad gäller analyser, bättre kundvärde och effektivisering av ”downtime”. Med ny teknik kommer även utmaningar. I takt med att teknologierna ständigt växer uppstår frågor kring säkerhet och etik och hur detta ska hanteras. Målet med denna studien var att ta reda på hur experter värderar etiska
APA, Harvard, Vancouver, ISO, and other styles
4

KRAYANI, ALI. "Learning Self-Awareness Models for Physical Layer Security in Cognitive and AI-enabled Radios." Doctoral thesis, Università degli studi di Genova, 2022. http://hdl.handle.net/11567/1074612.

Full text
Abstract:
Cognitive Radio (CR) is a paradigm shift in wireless communications to resolve the spectrum scarcity issue with the ability to self-organize, self-plan and self-regulate. On the other hand, wireless devices that can learn from their environment can also be taught things by malicious elements of their environment, and hence, malicious attacks are a great concern in the CR, especially for physical layer security. This thesis introduces a data-driven Self-Awareness (SA) module in CR that can support the system to establish secure networks against various attacks from malicious users. Such users c
APA, Harvard, Vancouver, ISO, and other styles
5

Ranang, Martin Thorsen. "An Artificial Immune System Approach to Preserving Security in Computer Networks." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2002. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-255.

Full text
Abstract:
<p>It is believed that many of the mechanisms present in the biological immune system are well suited for adoption to the field of computer intrusion detection, in the form of artificial immune systems. In this report mechanisms in the biological immune system are introduced, their parallels in artificial immune systems are presented, and how they may be applied to intrusion detection in a computer environment is discussed. An artificial immune system is designed, implemented and applied to detect intrusive behavior in real network data in a simulated network environment. The effect of costimu
APA, Harvard, Vancouver, ISO, and other styles
6

TOMA, ANDREA. "PHY-layer Security in Cognitive Radio Networks through Learning Deep Generative Models: an AI-based approach." Doctoral thesis, Università degli studi di Genova, 2020. http://hdl.handle.net/11567/1003576.

Full text
Abstract:
Recently, Cognitive Radio (CR) has been intended as an intelligent radio endowed with cognition which can be developed by implementing Artificial Intelligence (AI) techniques. Specifically, data-driven Self-Awareness (SA) functionalities, such as detection of spectrum abnormalities, can be effectively implemented as shown by the proposed research. One important application is PHY-layer security since it is essential to establish secure wireless communications against external jamming attacks. In this framework, signals are non-stationary and features from such kind of dynamic spectrum, with m
APA, Harvard, Vancouver, ISO, and other styles
7

Musgrave, John. "Cognitive Malice Representation and Identification." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1565348664149804.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Yueqian. "Resource Clogging Attacks in Mobile Crowd-Sensing: AI-based Modeling, Detection and Mitigation." Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/40082.

Full text
Abstract:
Mobile Crowdsensing (MCS) has emerged as a ubiquitous solution for data collection from embedded sensors of the smart devices to improve the sensing capacity and reduce the sensing costs in large regions. Due to the ubiquitous nature of MCS, smart devices require cyber protection against adversaries that are becoming smarter with the objective of clogging the resources and spreading misinformation in such a non-dedicated sensing environment. In an MCS setting, one of the various adversary types has the primary goal of keeping participant devices occupied by submitting fake/illegitimate sensing
APA, Harvard, Vancouver, ISO, and other styles
9

SYED, MUHAMMAD FARRUKH SHAHID. "Data-Driven Approach based on Deep Learning and Probabilistic Models for PHY-Layer Security in AI-enabled Cognitive Radio IoT." Doctoral thesis, Università degli studi di Genova, 2021. http://hdl.handle.net/11567/1048543.

Full text
Abstract:
Cognitive Radio Internet of Things (CR-IoT) has revolutionized almost every field of life and reshaped the technological world. Several tiny devices are seamlessly connected in a CR-IoT network to perform various tasks in many applications. Nevertheless, CR-IoT surfers from malicious attacks that pulverize communication and perturb network performance. Therefore, recently it is envisaged to introduce higher-level Artificial Intelligence (AI) by incorporating Self-Awareness (SA) capabilities into CR-IoT objects to facilitate CR-IoT networks to establish secure transmission against vicious attac
APA, Harvard, Vancouver, ISO, and other styles
10

SIGNORI, ROBERTA. "POLIZIA PENITENZIARIA E SORVEGLIANZA DINAMICA IN CARCERE Le risposte ai cambiamenti organizzativi e l’impatto sul benessere del personale." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2017. http://hdl.handle.net/10281/158284.

Full text
Abstract:
Il sistema Penitenziario Italiano è attualmente interessato da profondi mutamenti organizzativi che riguardano, in particolar modo, le modalità operative del personale di polizia penitenziaria. L’introduzione della sorveglianza dinamica in carcere ha rappresentato un importante cambiamento organizzativo capace di ridefinire gli spazi, i tempi e le modalità di interazione all’interno delle sezioni detentive. Quest’ ultima fa riferimento ad una modalità operativa incentrata non più sul controllo statico della persona detenuta, ma piuttosto sulla conoscenza e l’osservazione della stessa. Nella me
APA, Harvard, Vancouver, ISO, and other styles
11

Yakan, Hadi. "Security of V2X communications in 3GPP - 5G cellular networks." Electronic Thesis or Diss., université Paris-Saclay, 2023. http://www.theses.fr/2023UPASG077.

Full text
Abstract:
Avec les avancées technologiques apportées par les réseaux 5G, une nouvelle ère de communications de Vehicle-to-Everything (V2X) est apparue, offrant des applications nouvelles et avancées en matière de sécurité, d'efficacité et d'autres expériences de conduite dans les systèmes de transport intelligents (ITS). Cependant, les nouvelles fonctionnalités s'accompagnent de nouveaux défis en matière de sécurité, en particulier dans le domaine des communications Vehicle-to-Network (V2N).Cette thèse se concentre sur l'application des systèmes de misbehavior detection dans les communications V2X au se
APA, Harvard, Vancouver, ISO, and other styles
12

Shrivastwa, Ritu Ranjan. "Enhancements in Embedded Systems Security using Machine Learning." Electronic Thesis or Diss., Institut polytechnique de Paris, 2023. http://www.theses.fr/2023IPPAT051.

Full text
Abstract:
La liste des appareils connectés (ou IoT) s’allonge avec le temps, de même que leur vulnérabilité face aux attaques ciblées provenant du réseau ou de l’accès physique, communément appelées attaques Cyber Physique (CPS). Alors que les capteurs visant à détecter les attaques, et les techniques d’obscurcissement existent pour contrecarrer et améliorer la sécurité, il est possible de contourner ces contre-mesures avec des équipements et des méthodologies d’attaque sophistiqués, comme le montre la littérature récente. De plus, la conception des systèmes intégrés est soumise aux contraintes de compl
APA, Harvard, Vancouver, ISO, and other styles
13

Ringenson, Josefin. "Efficiency of CNN on Heterogeneous Processing Devices." Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-155034.

Full text
Abstract:
In the development of advanced driver assistance systems, computer vision problemsneed to be optimized to run efficiently on embedded platforms. Convolutional neural network(CNN) accelerators have proven to be very efficient for embedded camera platforms,such as the ones used for automotive vision systems. Therefore, the focus of this thesisis to evaluate the efficiency of a CNN on a future embedded heterogeneous processingdevice. The memory size in an embedded system is often very limited, and it is necessary todivide the input into multiple tiles. In addition, there are power and speed const
APA, Harvard, Vancouver, ISO, and other styles
14

Picot, Marine. "Protecting Deep Learning Systems Against Attack : Enhancing Adversarial Robustness and Detection." Electronic Thesis or Diss., université Paris-Saclay, 2023. http://www.theses.fr/2023UPASG017.

Full text
Abstract:
Au cours de la dernière décennie, l'apprentissage profond a été à l'origine de percées dans de nombreux domaines différents, tels que le traitement du langage naturel, la vision par ordinateur et la reconnaissance vocale. Cependant, il est désormais connu que les modèles basés sur l'apprentissage profond sont extrêmement sensibles aux perturbations, en particulier lorsque la perturbation est bien conçue et générée par un agent malveillant. Cette faiblesse des réseaux neuronaux profonds tend à empêcher leur utilisation dans des applications critiques, où des informations sensibles sont disponib
APA, Harvard, Vancouver, ISO, and other styles
15

Rastgoufard, Samin. "Applications of Artificial Intelligence in Power Systems." ScholarWorks@UNO, 2018. https://scholarworks.uno.edu/td/2487.

Full text
Abstract:
Artificial intelligence tools, which are fast, robust and adaptive can overcome the drawbacks of traditional solutions for several power systems problems. In this work, applications of AI techniques have been studied for solving two important problems in power systems. The first problem is static security evaluation (SSE). The objective of SSE is to identify the contingencies in planning and operations of power systems. Numerical conventional solutions are time-consuming, computationally expensive, and are not suitable for online applications. SSE may be considered as a binary-classification,
APA, Harvard, Vancouver, ISO, and other styles
16

ALTIERI, ALEX. "Yacht experience, ricerca e sviluppo di soluzioni basate su intelligenza artificiale per il comfort e la sicurezza in alto mare." Doctoral thesis, Università Politecnica delle Marche, 2021. http://hdl.handle.net/11566/287605.

Full text
Abstract:
La tesi descrive i risultati dell’attività di ricerca e sviluppo di nuove tecnologie basate su tecniche di intelligenza artificiale, capaci di raggiungere un’interazione empatica e una connessione emotiva tra l’uomo e “le macchine” così da migliorare il comfort e la sicurezza a bordo di uno yacht. Tale interazione è ottenuta grazie al riconoscimento di emozioni e comportamenti e alla successiva attivazione di tutti quegli apparati multimediali presenti nell’ambiente a bordo, che si adattano al mood del soggetto all’interno della stanza. Il sistema prototipale sviluppato durante i tre anni di d
APA, Harvard, Vancouver, ISO, and other styles
17

Kaplan, Caelin. "Compromis inhérents à l'apprentissage automatique préservant la confidentialité." Electronic Thesis or Diss., Université Côte d'Azur, 2024. http://www.theses.fr/2024COAZ4045.

Full text
Abstract:
À mesure que les modèles d'apprentissage automatique (ML) sont de plus en plus intégrés dans un large éventail d'applications, il devient plus important que jamais de garantir la confidentialité des données des individus. Cependant, les techniques actuelles entraînent souvent une perte d'utilité et peuvent affecter des facteurs comme l'équité et l'interprétabilité. Cette thèse vise à approfondir la compréhension des compromis dans trois techniques de ML respectueuses de la vie privée : la confidentialité différentielle, les défenses empiriques, et l'apprentissage fédéré, et à proposer des méth
APA, Harvard, Vancouver, ISO, and other styles
18

Charvát, Michal. "System for People Detection and Localization Using Thermal Imaging Cameras." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-432478.

Full text
Abstract:
V dnešním světě je neustále se zvyšující poptávka po spolehlivých automatizovaných mechanismech pro detekci a lokalizaci osob pro různé účely -- od analýzy pohybu návštěvníků v muzeích přes ovládání chytrých domovů až po hlídání nebezpečných oblastí, jimiž jsou například nástupiště vlakových stanic. Představujeme metodu detekce a lokalizace osob s pomocí nízkonákladových termálních kamer FLIR Lepton 3.5 a malých počítačů Raspberry Pi 3B+. Tento projekt, navazující na předchozí bakalářský projekt "Detekce lidí v místnosti za použití nízkonákladové termální kamery", nově podporuje modelování kom
APA, Harvard, Vancouver, ISO, and other styles
19

Wegner, Ryan. "Multi-agent malicious behaviour detection." 2012. http://hdl.handle.net/1993/9673.

Full text
Abstract:
This research presents a novel technique termed Multi-Agent Malicious Behaviour Detection. The goal of Multi-Agent Malicious Behaviour Detection is to provide infrastructure to allow for the detection and observation of malicious multi-agent systems in computer network environments. This research explores combinations of machine learning techniques and fuses them with a multi-agent approach to malicious behaviour detection that effectively blends human expertise from network defenders with modern artificial intelligence. Success of the approach depends on the Multi-Agent Malicious Behaviour
APA, Harvard, Vancouver, ISO, and other styles
20

Ho, Cheng Hann, and 何政翰. "AI mangement system for security check-A case study of Naval Base." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/s8e36k.

Full text
Abstract:
碩士<br>國立臺灣海洋大學<br>河海工程學系<br>106<br>Abstract In recent years, National Army has transformed and executed the "Pure Scenarios." In order to build up the defense organization, to meet the needs of possible war in the future, From 100 to 103 years of the Republic of China, according to the planning of relevant factors such as threats from the enemy, national security situation, entire resource allocation and fundraising promotion,. The streamlining of human resource has increase time of duty among all units of guards. Traditional paper identification card and vehicles are time-consuming, therefore
APA, Harvard, Vancouver, ISO, and other styles
21

Rees, Jonathan A. "A Security Kernel Based on the Lambda-Calculus." 1996. http://hdl.handle.net/1721.1/5944.

Full text
Abstract:
Cooperation between independent agents depends upon establishing adegree of security. Each of the cooperating agents needs assurance that the cooperation will not endanger resources of value to that agent. In a computer system, a computational mechanism can assure safe cooperation among the system's users by mediating resource access according to desired security policy. Such a mechanism, which is called a security kernel, lies at the heart of many operating systems and programming environments.The report describes Scheme 48, a programming environment whose design is guided by es
APA, Harvard, Vancouver, ISO, and other styles
22

Lautenschläger, Jana Katharina. "The effect of knowledge about artificial intelligence (Ai) on openness towards ai-enabled products and services: examining whether customer beliefs about the efficiency, convenience, privacy protection and data security of ai-enabled products and services mediate this effect." Master's thesis, 2020. http://hdl.handle.net/10362/104102.

Full text
Abstract:
Artificial Intelligence(“AI”)is a rapidly evolving technology and iscurrently the most promisingmarket opportunity in the worldeconomy. The study examines the relationship of customers knowledge aboutAI with theiropenness to interact with AI-enabled products/services. The author analyzes whether customer beliefs about efficiency, convenience, privacy protection and data security act as a mediator of this relationship. Analyzing primary data (n=331)throughregression models, the study suggests that thesignificantrelationship between knowledge and opennessispartially med
APA, Harvard, Vancouver, ISO, and other styles
23

"The What, When, and How of Strategic Movement in Adversarial Settings: A Syncretic View of AI and Security." Doctoral diss., 2020. http://hdl.handle.net/2286/R.I.62910.

Full text
Abstract:
abstract: The field of cyber-defenses has played catch-up in the cat-and-mouse game of finding vulnerabilities followed by the invention of patches to defend against them. With the complexity and scale of modern-day software, it is difficult to ensure that all known vulnerabilities are patched; moreover, the attacker, with reconnaissance on their side, will eventually discover and leverage them. To take away the attacker's inherent advantage of reconnaissance, researchers have proposed the notion of proactive defenses such as Moving Target Defense (MTD) in cyber-security. In this thesis, I mak
APA, Harvard, Vancouver, ISO, and other styles
24

Spanaki, K., E. Karafili, Uthayasankar Sivarajah, S. Despoudi, and Zahir Irani. "Artificial Intelligence and Food Security: Swarm Intelligence of AgriTech Drones for Smart AgriFood Operations." 2020. http://hdl.handle.net/10454/17961.

Full text
Abstract:
Yes<br>The Sustainable Development Goals (SDGs) present the emerging need to explore new ways of AgriFood production and food security as ultimate targets for feeding future generations. The study adopts a Design Science methodology and proposes Artificial Intelligence (AI) techniques as a solution to food security problems. Specifically, the proposed artefact presents the collective use of Agricultural Technology (AgriTech) drones inspired by the biomimetic ways of bird swarms. The design (artefact) appears here as a solution for supporting farming operations in inaccessible land, so as unman
APA, Harvard, Vancouver, ISO, and other styles
25

(7036475), Shiqing Ma. "EFFECTIVE AND EFFICIENT COMPUTATION SYSTEM PROVENANCE TRACKING." Thesis, 2019.

Find full text
Abstract:
<div><div><div><p>Provenance collection and analysis is one of the most important techniques used in analyzing computation system behaviors. For forensic analysis in enterprise environment, existing provenance systems are limited. On one hand, they tend to log many redundant and irrelevant events causing high runtime and space overhead as well as long investigation time. On the other hand, they lack the application specific provenance data, leading to ineffective investigation process. Moreover, emerging machine learning especially deep learning based artificial intelligence systems are hard t
APA, Harvard, Vancouver, ISO, and other styles
26

Ugail, Hassan, Rami S. R. Qahwaji, Rae A. Earnshaw, and P. J. Willis. "Proceedings of Cyberworlds 2009." 2009. http://hdl.handle.net/10454/7300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!