Дисертації з теми "AI security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-26 дисертацій для дослідження на тему "AI security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Djaidja, Taki Eddine Toufik. "Advancing the Security of 5G and Beyond Vehicular Networks through AI/DL." Electronic Thesis or Diss., Bourgogne Franche-Comté, 2024. http://www.theses.fr/2024UBFCK009.
Повний текст джерелаThe emergence of Fifth Generation (5G) and Vehicle-to-Everything (V2X) networks has ushered in an era of unparalleled connectivity and associated services. These networks facilitate seamless interactions among vehicles, infrastructure, and more, providing a range of services through network slices, each tailored to specific requirements. Future generations are even expected to bring further advancements to these networks. However, this remarkable progress also exposes them to a myriad of security threats, many of which current measures struggle to detect and mitigate effectively. This underscores the need for advanced intrusion detection mechanisms to ensure the integrity, confidentiality, and availability of data and services.One area of increasing interest in both academia and industry spheres is Artificial Intelligence (AI), particularly its application in addressing cybersecurity threats. Notably, neural networks (NNs) have demonstrated promise in this context, although AI-based solutions do come with inherent challenges. These challenges can be summarized as concerns about effectiveness and efficiency. The former pertains to the need for Intrusion Detection Systems (IDSs) to accurately detect threats, while the latter involves achieving time efficiency and early threat detection.This dissertation represents the culmination of our research findings on investigating the aforementioned challenges of AI-based IDSs in 5G systems in general and 5G-V2X in particular. We initiated our investigation by conducting a comprehensive review of the existing literature. Throughout this thesis, we explore the utilization of Fuzzy Inference Systems (FISs) and NNs, with a specific emphasis on the latter. We leveraged state-of-the-art NN learning, referred to as Deep Learning (DL), including the incorporation of recurrent neural networks and attention mechanisms. These techniques are innovatively harnessed to making significant progress in addressing the concerns of enhancing the effectiveness and efficiency of IDSs. Moreover, our research delves into additional challenges related to data privacy when employing DL-based IDSs. We achieve this by leveraging and experimenting state-of-the-art federated learning (FL) algorithms
Hatoum, Makram. "Digital watermarking for PDF documents and images : security, robustness and AI-based attack." Thesis, Bourgogne Franche-Comté, 2020. http://www.theses.fr/2020UBFCD016.
Повний текст джерелаTechnological development has its pros and cons. Nowadays, we can easily share, download, and upload digital content using the Internet. Also, malicious users can illegally change, duplicate, and distribute any kind of information, such as images and documents. Therefore, we should protect such contents and arrest the perpetrator. The goal of this thesis is to protect PDF documents and images using the Spread Transform Dither Modulation (STDM), as a digital watermarking technique, while taking into consideration the main requirements of transparency, robustness, and security. STDM watermarking scheme achieved a good level of transparency and robustness against noise attacks. The key to this scheme is the projection vector that aims to spreads the embedded message over a set of cover elements. However, such a key vector can be estimated by unauthorized users using the Blind Source Separation (BSS) techniques. In our first contribution, we present our proposed CAR-STDM (Component Analysis Resistant-STDM) watermarking scheme, which guarantees security while preserving the transparency and robustness against noise attacks. STDM is also affected by the Fixed Gain Attack (FGA). In the second contribution, we present our proposed N-STDM watermarking scheme that resists the FGA attack and enhances the robustness against the Additive White Gaussian Noise (AWGN) attack, JPEG compression attack, and variety of filtering and geometric attacks. Experimentations have been conducted distinctly on PDF documents and images in the spatial domain and frequency domain. Recently, Deep Learning and Neural Networks achieved noticeable development and improvement, especially in image processing, segmentation, and classification. Diverse models such as Convolutional Neural Network (CNN) are exploited for modeling image priors for denoising. CNN has a suitable denoising performance, and it could be harmful to watermarked images. In the third contribution, we present the effect of a Fully Convolutional Neural Network (FCNN), as a denoising attack, on watermarked images. STDM and Spread Spectrum (SS) are used as watermarking schemes to embed the watermarks in the images using several scenarios. This evaluation shows that such type of denoising attack preserves the image quality while breaking the robustness of all evaluated watermarked schemes
Radosavljevic, Bojan, and Axel Kimblad. "Etik och säkerhet när AI möter IoT." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20613.
Повний текст джерелаIn today's society, technological developments are moving fast. Artificial intelligence and the Internet of Things are two technologies within the development whose popularity has increased in recent years. These technologies in integration have proven to be able to contribute with major business benefits, including in the form of increased precision with regard to analyzes, better customer value and efficiency of downtime. New technology also presents challenges. As the technologies are constantly growing, issues arise regarding safety and ethics and how this should be managed. The aim of this study is to find out how experts value ethical issues when using artificial intelligence in combination with the Internet of Things devices. We focused on the following research question to reach our goal: How are ethical issues evaluated when using artificial intelligence in combination with the Internet of Things? The result we found shows that both researchers and the business world value the ethical aspects highly. The study also shows that they considered the techniques to be the solution to many societal problems, but that ethics should be a topic that should be discussed on an ongoing basis.
KRAYANI, ALI. "Learning Self-Awareness Models for Physical Layer Security in Cognitive and AI-enabled Radios." Doctoral thesis, Università degli studi di Genova, 2022. http://hdl.handle.net/11567/1074612.
Повний текст джерелаRanang, Martin Thorsen. "An Artificial Immune System Approach to Preserving Security in Computer Networks." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2002. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-255.
Повний текст джерелаIt is believed that many of the mechanisms present in the biological immune system are well suited for adoption to the field of computer intrusion detection, in the form of artificial immune systems. In this report mechanisms in the biological immune system are introduced, their parallels in artificial immune systems are presented, and how they may be applied to intrusion detection in a computer environment is discussed. An artificial immune system is designed, implemented and applied to detect intrusive behavior in real network data in a simulated network environment. The effect of costimulation and clonal proliferation combined with somatic hypermutation to perform affinity maturation of detectors in the artificial immune system is explored through experiments. An exact expression for the probability of a match between two randomly chosen strings using the r-contiguous matching rule is developed. The use of affinity maturation makes it possible to perform anomaly detection by using smaller sets of detectors with a high level of specificity while maintaining a high level of cover and diversity, which increases the number of true positives, while keeping a low level of false negatives.
TOMA, ANDREA. "PHY-layer Security in Cognitive Radio Networks through Learning Deep Generative Models: an AI-based approach." Doctoral thesis, Università degli studi di Genova, 2020. http://hdl.handle.net/11567/1003576.
Повний текст джерелаMusgrave, John. "Cognitive Malice Representation and Identification." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1565348664149804.
Повний текст джерелаZhang, Yueqian. "Resource Clogging Attacks in Mobile Crowd-Sensing: AI-based Modeling, Detection and Mitigation." Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/40082.
Повний текст джерелаSYED, MUHAMMAD FARRUKH SHAHID. "Data-Driven Approach based on Deep Learning and Probabilistic Models for PHY-Layer Security in AI-enabled Cognitive Radio IoT." Doctoral thesis, Università degli studi di Genova, 2021. http://hdl.handle.net/11567/1048543.
Повний текст джерелаSIGNORI, ROBERTA. "POLIZIA PENITENZIARIA E SORVEGLIANZA DINAMICA IN CARCERE Le risposte ai cambiamenti organizzativi e l’impatto sul benessere del personale." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2017. http://hdl.handle.net/10281/158284.
Повний текст джерелаThe Italian prison system is affected by deep organisational changes which affect the work of prison officers. The implementation of the so called “dynamic security” within detention wings is likely to redefine the interaction patterns between the staff and offenders. The “dynamic security” is regarded as an innovative surveillance procedure which relies on the observation and the knowledge of the offenders, rather than on their physical control. According to policy makers, the “dynamic security” is not just an innovative way of ensuring security, but it should also represent a “new way of being” of prison officers (de Pascalis 2013). The implementation of this organisational change raises questions regarding its influence on the daily life of offenders and prison guards and their interaction within a changing environment. This research focuses on the influence of the implementation of the “dynamic security” on prison officers role identity. It aims to shed light on the identity related dimension of the prison work within a context that I defined as “liminal” by virtue of the coexistence of two antithetical institutional objectives, that is to say, rehabilitation and reclusion. Indeed, responses to organizational changes cannot be understood and interpreted without taking into consideration the dynamics and processes of identification in the role of prison officer. This research will highlight the conditions which can facilitate the transition to new work practices and foster prison officer wellbeing, through the analysis of the processes of identification within the changing environment of prison.
Yakan, Hadi. "Security of V2X communications in 3GPP - 5G cellular networks." Electronic Thesis or Diss., université Paris-Saclay, 2023. http://www.theses.fr/2023UPASG077.
Повний текст джерелаThe introduction of 5G networks has brought significant technical improvements; a new era of Vehicle-to-Everything (V2X) communications has emerged, offering new and advanced safety, efficiency, and other driving experience applications in the Intelligent Transport Systems (ITS). However, with new features come new security challenges, especially in the realm of Vehicle-to-Network (V2N) communications.This thesis focuses on the application of misbehavior detection in V2X communications within 5G networks. First, we introduce a novel misbehavior detection system integrated with 5G core (5GC) network to detect and prevent V2X attacks. Then, we propose a collaboration scheme between detection nodes to improve detection results in 5G edge networks. Last, we leverage Federated Learning to enable distributed training, and we assess the performance on a wide variety of V2X attacks
Shrivastwa, Ritu Ranjan. "Enhancements in Embedded Systems Security using Machine Learning." Electronic Thesis or Diss., Institut polytechnique de Paris, 2023. http://www.theses.fr/2023IPPAT051.
Повний текст джерелаThe list of connected devices (or IoT) is growing longer with time and so is the intense vulnerability to security of the devices against targeted attacks originating from network or physical penetration, popularly known as Cyber Physical Security (CPS) attacks. While security sensors and obfuscation techniques exist to counteract and enhance security, it is possible to fool these classical security countermeasures with sophisticated attack equipment and methodologies as shown in recent literature. Additionally, end node embedded systems design is bound by area and is required to be scalable, thus, making it difficult to adjoin complex sensing mechanism against cyberphysical attacks. The solution may lie in Artificial Intelligence (AI) security core (soft or hard) to monitor data behaviour internally from various components. Additionally the AI core can monitor the overall device behaviour, including attached sensors, to detect any outlier activity and provide a smart sensing approach to attacks. AI in hardware security domain is still not widely acceptable due to the probabilistic behaviour of the advanced deep learning techniques, there have been works showing practical implementations for the same. This work is targeted to establish a proof of concept and build trust of AI in security by detailed analysis of different Machine Learning (ML) techniques and their use cases in hardware security followed by a series of case studies to provide practical framework and guidelines to use AI in various embedded security fronts. Applications can be in PUFpredictability assessment, sensor fusion, Side Channel Attacks (SCA), Hardware Trojan detection, Control flow integrity, Adversarial AI, etc
Ringenson, Josefin. "Efficiency of CNN on Heterogeneous Processing Devices." Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-155034.
Повний текст джерелаPicot, Marine. "Protecting Deep Learning Systems Against Attack : Enhancing Adversarial Robustness and Detection." Electronic Thesis or Diss., université Paris-Saclay, 2023. http://www.theses.fr/2023UPASG017.
Повний текст джерелаOver the last decade, Deep Learning has been the source of breakthroughs in many different fields, such as Natural Language Processing, Computer Vision, and Speech Recognition. However, Deep Learning-based models have now been recognized to be extremely sensitive to perturbations, especially when the perturbation is well-designed and generated by a malicious agent. This weakness of Deep Neural Networks tends to prevent their use in critical applications, where sensitive information is available, or when the system interacts directly with people's everyday life. In this thesis, we focus on protecting Deep Neural Networks against malicious agents in two main ways. The first method aims at protecting a model from attacks by increasing its robustness, i.e., the ability of the model to predict the right class even under threats. We observe that the output of a Deep Neural Network forms a statistical manifold and that the decision is taken on this manifold. We leverage this knowledge by using the Fisher-Rao measure, which computes the geodesic distance between two probability distributions on the statistical manifold to which they belong. We exploit the Fisher-Rao measure to regularize the training loss to increase the model robustness. We then adapt this method to another critical application: the Smart Grids, which, due to monitoring and various service needs, rely on cyber components, such as a state estimator, making them sensitive to attacks. We, therefore, build robust state estimators using Variational AutoEncoders and the extension of our proposed method to the regression case. The second method we focus on that intends to protect Deep-Learning-based models is the detection of adversarial samples. By augmenting the model with a detector, it is possible to increase the reliability of decisions made by Deep Neural Networks. Multiple detection methods are available nowadays but often rely on heavy training and ad-hoc heuristics. In our work, we make use of a simple statistical tool called the data-depth to build efficient supervised (i.e., attacks are provided during training) and unsupervised (i.e., training can only rely on clean samples) detection methods
Rastgoufard, Samin. "Applications of Artificial Intelligence in Power Systems." ScholarWorks@UNO, 2018. https://scholarworks.uno.edu/td/2487.
Повний текст джерелаALTIERI, ALEX. "Yacht experience, ricerca e sviluppo di soluzioni basate su intelligenza artificiale per il comfort e la sicurezza in alto mare." Doctoral thesis, Università Politecnica delle Marche, 2021. http://hdl.handle.net/11566/287605.
Повний текст джерелаThe thesis describes the results of the research and development of new technologies based on artificial intelligence techniques, able to achieve an empathic interaction and an emotional connection between man and "the machines" in order to improve comfort and safety on board of yachts. This interaction is achieved through the recognition of emotions and behaviors and the following activation of all those multimedia devices available in the environment on board, which are adapted to the mood of the subject inside the room. The prototype system developed during the three years of PhD is now able to manage multimedia content (e.g. music tracks, videos played on LED screens) and light scenarios, based on the user's emotion, recognized by facial expressions taken from any camera installed inside the space. In order to make the interaction adaptive, the developed system implements Deep Learning algorithms to recognize the identity of the users on board (Facial Recognition), the degree of attention of the commander (Gaze Detection and Drowsiness) and the objects with which he interacts (phone, earphones, etc.). This information is processed within the system to identify any situations of risk to the safety of people on board and to monitor the entire environment. The application of these technologies, in this domain that is always open to the introduction of the latest innovations on board, opens up several research challenges.
Kaplan, Caelin. "Compromis inhérents à l'apprentissage automatique préservant la confidentialité." Electronic Thesis or Diss., Université Côte d'Azur, 2024. http://www.theses.fr/2024COAZ4045.
Повний текст джерелаAs machine learning (ML) models are increasingly integrated into a wide range of applications, ensuring the privacy of individuals' data is becoming more important than ever. However, privacy-preserving ML techniques often result in reduced task-specific utility and may negatively impact other essential factors like fairness, robustness, and interpretability. These challenges have limited the widespread adoption of privacy-preserving methods. This thesis aims to address these challenges through two primary goals: (1) to deepen the understanding of key trade-offs in three privacy-preserving ML techniques—differential privacy, empirical privacy defenses, and federated learning; (2) to propose novel methods and algorithms that improve utility and effectiveness while maintaining privacy protections. The first study in this thesis investigates how differential privacy impacts fairness across groups defined by sensitive attributes. While previous assumptions suggested that differential privacy could exacerbate unfairness in ML models, our experiments demonstrate that selecting an optimal model architecture and tuning hyperparameters for DP-SGD (Differentially Private Stochastic Gradient Descent) can mitigate fairness disparities. Using standard ML fairness datasets, we show that group disparities in metrics like demographic parity, equalized odds, and predictive parity are often reduced or remain negligible when compared to non-private baselines, challenging the prevailing notion that differential privacy worsens fairness for underrepresented groups. The second study focuses on empirical privacy defenses, which aim to protect training data privacy while minimizing utility loss. Most existing defenses assume access to reference data---an additional dataset from the same or a similar distribution as the training data. However, previous works have largely neglected to evaluate the privacy risks associated with reference data. To address this, we conducted the first comprehensive analysis of reference data privacy in empirical defenses. We proposed a baseline defense method, Weighted Empirical Risk Minimization (WERM), which allows for a clearer understanding of the trade-offs between model utility, training data privacy, and reference data privacy. In addition to offering theoretical guarantees on model utility and the relative privacy of training and reference data, WERM consistently outperforms state-of-the-art empirical privacy defenses in nearly all relative privacy regimes.The third study addresses the convergence-related trade-offs in Collaborative Inference Systems (CISs), which are increasingly used in the Internet of Things (IoT) to enable smaller nodes in a network to offload part of their inference tasks to more powerful nodes. While Federated Learning (FL) is often used to jointly train models within CISs, traditional methods have overlooked the operational dynamics of these systems, such as heterogeneity in serving rates across nodes. We propose a novel FL approach explicitly designed for CISs, which accounts for varying serving rates and uneven data availability. Our framework provides theoretical guarantees and consistently outperforms state-of-the-art algorithms, particularly in scenarios where end devices handle high inference request rates.In conclusion, this thesis advances the field of privacy-preserving ML by addressing key trade-offs in differential privacy, empirical privacy defenses, and federated learning. The proposed methods provide new insights into balancing privacy with utility and other critical factors, offering practical solutions for integrating privacy-preserving techniques into real-world applications. These contributions aim to support the responsible and ethical deployment of AI technologies that prioritize data privacy and protection
Charvát, Michal. "System for People Detection and Localization Using Thermal Imaging Cameras." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-432478.
Повний текст джерелаWegner, Ryan. "Multi-agent malicious behaviour detection." 2012. http://hdl.handle.net/1993/9673.
Повний текст джерелаHo, Cheng Hann, and 何政翰. "AI mangement system for security check-A case study of Naval Base." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/s8e36k.
Повний текст джерела國立臺灣海洋大學
河海工程學系
106
Abstract In recent years, National Army has transformed and executed the "Pure Scenarios." In order to build up the defense organization, to meet the needs of possible war in the future, From 100 to 103 years of the Republic of China, according to the planning of relevant factors such as threats from the enemy, national security situation, entire resource allocation and fundraising promotion,. The streamlining of human resource has increase time of duty among all units of guards. Traditional paper identification card and vehicles are time-consuming, therefore it has caused:Firstly people in duty tiredness , secondly resulting in many accidents caused by negligence on the part of the authorities. Especially for some organization set same fixed work time, people come and leave office at the same time, the security check may not be thoroughly operate also stop the traffic in peak time at the entrance, lead to failure to implement access security. Hence, this thesis evaluates the combination of face recognition and license plate recognition technology installed in the Army camp entrance to reduce manpower burden and enhance security management control as the research case. The development of contactless access control technology has allowed the certain persons or vehicles to entry under restricted conditions. Use human faces and vehicles number plate to identify and control the access to entrance. People no longer need to carry a proximity card or paper certificate, nor have any contact with the test device. People only need to use a simple photo camera device to capture the needed information for identification. Therefore, this identification methods is convenient, efficient and safe, It can provide a reference for entrance security improvement to the national army . Keywords: Artificial Intelligence, Face Recognition, License Plate Recognition, Entrance Guard, Army Camp
Rees, Jonathan A. "A Security Kernel Based on the Lambda-Calculus." 1996. http://hdl.handle.net/1721.1/5944.
Повний текст джерелаLautenschläger, Jana Katharina. "The effect of knowledge about artificial intelligence (Ai) on openness towards ai-enabled products and services: examining whether customer beliefs about the efficiency, convenience, privacy protection and data security of ai-enabled products and services mediate this effect." Master's thesis, 2020. http://hdl.handle.net/10362/104102.
Повний текст джерела"The What, When, and How of Strategic Movement in Adversarial Settings: A Syncretic View of AI and Security." Doctoral diss., 2020. http://hdl.handle.net/2286/R.I.62910.
Повний текст джерелаDissertation/Thesis
Doctoral Dissertation Computer Science 2020
Spanaki, K., E. Karafili, Uthayasankar Sivarajah, S. Despoudi, and Zahir Irani. "Artificial Intelligence and Food Security: Swarm Intelligence of AgriTech Drones for Smart AgriFood Operations." 2020. http://hdl.handle.net/10454/17961.
Повний текст джерелаThe Sustainable Development Goals (SDGs) present the emerging need to explore new ways of AgriFood production and food security as ultimate targets for feeding future generations. The study adopts a Design Science methodology and proposes Artificial Intelligence (AI) techniques as a solution to food security problems. Specifically, the proposed artefact presents the collective use of Agricultural Technology (AgriTech) drones inspired by the biomimetic ways of bird swarms. The design (artefact) appears here as a solution for supporting farming operations in inaccessible land, so as unmanned aerial devices contribute and improve the productivity of farming areas with limited capacity. The proposed design is developed through a scenario of drone swarms applying AI techniques to address food security issues. The study concludes by presenting a research agenda and the sectoral challenges triggered by the applications of AI in Agriculture.
European Union's H2020 research and innovation programme under the Marie Skłodowska-Curie grant (agreement No. 746667)
The full-text of this article will be released for public view at the end of the publisher embargo on 25 Feb 2022.
(7036475), Shiqing Ma. "EFFECTIVE AND EFFICIENT COMPUTATION SYSTEM PROVENANCE TRACKING." Thesis, 2019.
Знайти повний текст джерелаProvenance collection and analysis is one of the most important techniques used in analyzing computation system behaviors. For forensic analysis in enterprise environment, existing provenance systems are limited. On one hand, they tend to log many redundant and irrelevant events causing high runtime and space overhead as well as long investigation time. On the other hand, they lack the application specific provenance data, leading to ineffective investigation process. Moreover, emerging machine learning especially deep learning based artificial intelligence systems are hard to interpret and vulnerable to adversarial attacks. Using provenance information to analyze such systems and defend adversarial attacks is potentially very promising but not well-studied yet.
In this dissertation, I try to address the aforementioned challenges. I present an effective and efficient operating system level provenance data collector, ProTracer. It features the idea of alternating between logging and tainting to perform on-the-fly log filtering and reduction to achieve low runtime and storage overhead. Tainting is used to track the dependence relationships between system call events, and logging is performed only when useful dependencies are detected. I also develop MPI, an LLVM based analysis and instrumentation framework which automatically transfers existing applications to be provenance-aware. It requires the programmers to annotate the desired data structures used for partitioning, and then instruments the program to actively emit application specific semantics to provenance collectors which can be used for multiple perspective attack investigation. In the end, I propose a new technique named NIC, a provenance collection and analysis technique for deep learning systems. It analyzes deep learning system internal variables to generate system invariants as provenance for such systems, which can be then used to as a general way to detect adversarial attacks.
Ugail, Hassan, Rami S. R. Qahwaji, Rae A. Earnshaw, and P. J. Willis. "Proceedings of Cyberworlds 2009." 2009. http://hdl.handle.net/10454/7300.
Повний текст джерела