CCNU Information Security

华中师范大学信息安全实验室

Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper)


Conference paper


Yidan Zhang, Marino Anthony James, Jiageng Chen, Chunhua Su, Jinguang Han
Lecture Notes in Computer Science, Joseph K. Liu, Pierangela Samarati, Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings, vol. 10701, Springer, 2017, pp. 566--575

Cite

Cite

APA   Click to copy
Zhang, Y., James, M. A., Chen, J., Su, C., & Han, J. (2017). Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper). In J. K. Liu & P. Samarati (Eds.), Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings (Vol. 10701, pp. 566–575). Springer.


Chicago/Turabian   Click to copy
Zhang, Yidan, Marino Anthony James, Jiageng Chen, Chunhua Su, and Jinguang Han. “Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper).” In Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings, edited by Joseph K. Liu and Pierangela Samarati, 10701:566–575. Lecture Notes in Computer Science. Springer, 2017.


MLA   Click to copy
Zhang, Yidan, et al. “Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper).” Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings, edited by Joseph K. Liu and Pierangela Samarati, vol. 10701, Springer, 2017, pp. 566–75.


BibTeX   Click to copy

@inproceedings{zhang2017a,
  title = {Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper)},
  year = {2017},
  pages = {566--575},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {10701},
  author = {Zhang, Yidan and James, Marino Anthony and Chen, Jiageng and Su, Chunhua and Han, Jinguang},
  editor = {Liu, Joseph K. and Samarati, Pierangela},
  booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}
}