Chaotic image encryption: state-of-the-art, ecosystem, and future roadmap

B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
Recently, many researchers have been interested in the application of chaos in
cryptography. Specifically, numerous research works have been focusing on chaotic image …

The dichotomy of neural networks and cryptography: war and peace

B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
In recent years, neural networks and cryptographic schemes have come together in war and
peace; a cross-impact that forms a dichotomy deserving a comprehensive review study …

The dichotomy of cloud and iot: Cloud-assisted iot from a security perspective

B Zolfaghari, A Yazdinejad, A Dehghantanha… - arXiv preprint arXiv …, 2022 - arxiv.org
In recent years, the existence of a significant cross-impact between Cloud computing and
Internet of Things (IoT) has lead to a dichotomy that gives raise to Cloud-Assisted IoT …

An Introductory Survey of Entropy Applications to Information Theory, Queuing Theory, Engineering, Computer Science, and Statistical Mechanics

IA Mageed, Q Zhang - 2022 27th International Conference on …, 2022 - ieeexplore.ieee.org
Clausius was the first to coin the term “entropy” roughly 160 years ago. Since then, many
scholars from several scientific fields have continued to enhance, develop, and interpret the …

Crypto makes ai evolve

B Zolfaghari, H Nemati, N Yanai, K Bibak - Crypto and AI: From …, 2023 - Springer
Adopting cryptography has given rise to a significant? evolution in AI. This chapter studies
the path and stages of this evolution. We start with reviewing existing relevant surveys …

AI makes crypto evolve

B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
The recent literature reveals a dichotomy formed by a coevolution between cryptography
and Artificial Intelligence (AI). This dichotomy consists of two sides, namely Crypto …

The Dichotomy of Crypto and NN: War and Peace

B Zolfaghari, H Nemati, N Yanai, K Bibak - Crypto and AI: From …, 2023 - Springer
In recent years, NNs, as the basic components in AI models and cryptographic schemes,
have come together in war and peace; a cross-impact forms a dichotomy deserving a …

SYNTROPY: TCP SYN DDoS attack detection for Software Defined Network based on Rényi entropy

VA Shirsath, MM Chandane, C Lal, M Conti - Computer Networks, 2024 - Elsevier
The rapidly evolving landscape of network security, particularly in Software Defined
Networks (SDNs), presents a critical need for efficient and adaptive DDoS attack detection …

[HTML][HTML] Applications of Entropy in Data Analysis and Machine Learning: A Review

SA Sepúlveda-Fontaine, JM Amigó - Entropy, 2024 - mdpi.com
Since its origin in the thermodynamics of the 19th century, the concept of entropy has also
permeated other fields of physics and mathematics, such as Classical and Quantum …

[HTML][HTML] A Novel Hybrid Elementary Cellular Automata and Its Application in a Stream Cipher

P Du, Y Dong, Q Cui, H Li - Applied Sciences, 2024 - mdpi.com
The elementary cellular automata (ECAs) under the chaotic rule possess long periodicity
and are widely used in pseudo-random number generators. However, their period is limited …