Academic literature on the topic 'AI security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'AI security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "AI security"
Yogesh Kumar Bhardwaj. "Securing Generative AI: Navigating Data Security Challenges in the AI Era." Journal of Computer Science and Technology Studies 7, no. 4 (2025): 147–55. https://doi.org/10.32996/jcsts.2025.7.4.17.
Full textPoongodi, R. K. "Zero Trust AI Authentication and Blockchain Powered Secure AI." International Journal for Research in Applied Science and Engineering Technology 13, no. 2 (2025): 52–56. https://doi.org/10.22214/ijraset.2025.66800.
Full textChiranjeevi, G., R. Abhishek Reddy, R. Shyam, Swati Sah, and Rejwan Bin Sulaiman. "Docker Based Decentralized Vulnerability Assessment with Port Scanning Powered by Artificial Intelligence." FMDB Transactions on Sustainable Intelligent Networks 1, no. 4 (2024): 220–41. https://doi.org/10.69888/ftsin.2024.000290.
Full textChen, Hsinchun. "AI and Security Informatics." IEEE Intelligent Systems 25, no. 5 (2010): 82–90. http://dx.doi.org/10.1109/mis.2010.116.
Full textAgrawal, Jatin, Samarjeet Singh Kalra, and Himanshu Gidwani. "AI in cyber security." International Journal of Communication and Information Technology 4, no. 1 (2023): 46–53. http://dx.doi.org/10.33545/2707661x.2023.v4.i1a.59.
Full textBS, Guru Prasad, Dr Kiran GM, and Dr Dinesha HA. "AI-Driven cyber security: Security intelligence modelling." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 6 (2023): 961–65. http://dx.doi.org/10.54660/.ijmrge.2023.4.6.961-965.
Full textAbudalou, Mohammad Ali. "Security DevOps: Enhancing Application Delivery with Speed and Security." International Journal of Computer Science and Mobile Computing 13, no. 5 (2024): 100–104. http://dx.doi.org/10.47760/ijcsmc.2024.v13i05.009.
Full textPoonia, Ramesh Chandra. "Securing the Sustainable Future : Cryptography and Security in AI & IoT." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 4 (2024): i—vii. http://dx.doi.org/10.47974/jdmsc-27-4-foreword.
Full textGudimetla, Sandeep Reddy, and Niranjan Reddy Kotha. "AI-POWERED THREAT DETECTION IN CLOUD ENVIRONMENTS." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 9, no. 1 (2018): 638–42. http://dx.doi.org/10.61841/turcomat.v9i1.14730.
Full textSohaib uz Zaman, Erum Parveen, and Syed Hasnain Alam. "AI to Enhance the Transactional Security in Digital Banking." Journal of Management & Social Science 2, no. 2 (2025): 1–22. https://doi.org/10.63075/2apb3z22.
Full textDissertations / Theses on the topic "AI security"
Djaidja, Taki Eddine Toufik. "Advancing the Security of 5G and Beyond Vehicular Networks through AI/DL." Electronic Thesis or Diss., Bourgogne Franche-Comté, 2024. http://www.theses.fr/2024UBFCK009.
Full textHatoum, Makram. "Digital watermarking for PDF documents and images : security, robustness and AI-based attack." Thesis, Bourgogne Franche-Comté, 2020. http://www.theses.fr/2020UBFCD016.
Full textRadosavljevic, Bojan, and Axel Kimblad. "Etik och säkerhet när AI möter IoT." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20613.
Full textKRAYANI, ALI. "Learning Self-Awareness Models for Physical Layer Security in Cognitive and AI-enabled Radios." Doctoral thesis, Università degli studi di Genova, 2022. http://hdl.handle.net/11567/1074612.
Full textRanang, Martin Thorsen. "An Artificial Immune System Approach to Preserving Security in Computer Networks." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2002. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-255.
Full textTOMA, ANDREA. "PHY-layer Security in Cognitive Radio Networks through Learning Deep Generative Models: an AI-based approach." Doctoral thesis, Università degli studi di Genova, 2020. http://hdl.handle.net/11567/1003576.
Full textMusgrave, John. "Cognitive Malice Representation and Identification." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1565348664149804.
Full textZhang, Yueqian. "Resource Clogging Attacks in Mobile Crowd-Sensing: AI-based Modeling, Detection and Mitigation." Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/40082.
Full textSYED, MUHAMMAD FARRUKH SHAHID. "Data-Driven Approach based on Deep Learning and Probabilistic Models for PHY-Layer Security in AI-enabled Cognitive Radio IoT." Doctoral thesis, Università degli studi di Genova, 2021. http://hdl.handle.net/11567/1048543.
Full textSIGNORI, ROBERTA. "POLIZIA PENITENZIARIA E SORVEGLIANZA DINAMICA IN CARCERE Le risposte ai cambiamenti organizzativi e l’impatto sul benessere del personale." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2017. http://hdl.handle.net/10281/158284.
Full textBooks on the topic "AI security"
Huang, Ken, Yang Wang, Ben Goertzel, Yale Li, Sean Wright, and Jyoti Ponnapalli, eds. Generative AI Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54252-7.
Full textThakkar, Hiren Kumar, Mayank Swarnkar, and Robin Singh Bhadoria, eds. Predictive Data Security using AI. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-6290-5.
Full textWhitlock, Chris, and Frank Strickland. Winning the National Security AI Competition. Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-8814-6.
Full textSehgal, Naresh Kumar, Manoj Saxena, and Dhaval N. Shah. AI on the Edge with Security. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-78272-5.
Full textJaswal, Gaurav, Vivek Kanhangad, and Raghavendra Ramachandra, eds. AI and Deep Learning in Biometric Security. CRC Press, 2021. http://dx.doi.org/10.1201/9781003003489.
Full textHewage, Chaminda, Liqaa Nawaf, and Nishtha Kesswani, eds. AI Applications in Cyber Security and Communication Networks. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-3973-8.
Full textKulkarni, Anand J., Patrick Siarry, Apoorva S. Shastri, and Mangal Singh. AI-Based Metaheuristics for Information Security and Digital Media. Chapman and Hall/CRC, 2023. http://dx.doi.org/10.1201/9781003107767.
Full textKarimipour, Hadis, and Farnaz Derakhshan, eds. AI-Enabled Threat Detection and Security Analysis for Industrial IoT. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-76613-9.
Full textRaj, Balwinder, Brij B. Gupta, Shingo Yamaguchi, and Sandeep Singh Gill. AI for Big Data-Based Engineering Applications from Security Perspectives. CRC Press, 2023. http://dx.doi.org/10.1201/9781003230113.
Full textBook chapters on the topic "AI security"
Cagle, Anton, and Ahmed Ceifelnasr Ahmed. "Security." In Architecting Enterprise AI Applications. Apress, 2024. https://doi.org/10.1007/979-8-8688-0902-6_10.
Full textHuang, Ken, Aditi Joshi, Sandy Dun, and Nick Hamilton. "AI Regulations." In Generative AI Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54252-7_3.
Full textSharma, Dilli Prasad, Arash Habibi Lashkari, Mahdi Daghmehchi Firoozjaei, Samaneh Mahdavifar, and Pulei Xiong. "AI in Security." In Progress in IS. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-91524-6_3.
Full textHuang, Ken, Ben Goertzel, Daniel Wu, and Anita Xie. "GenAI Model Security." In Generative AI Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54252-7_6.
Full textHuang, Ken, Jerry Huang, and Daniele Catteddu. "GenAI Data Security." In Generative AI Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54252-7_5.
Full textTaherdoost, Hamed. "AI for cyber security and cyber security for AI." In Artificial Intelligence for Cyber Security and Industry 4.0. CRC Press, 2025. https://doi.org/10.1201/9781032657264-1.
Full textHuang, Ken, Grace Huang, Adam Dawson, and Daniel Wu. "GenAI Application Level Security." In Generative AI Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54252-7_7.
Full textHuang, Ken, Fan Zhang, Yale Li, Sean Wright, Vasan Kidambi, and Vishwas Manral. "Security and Privacy Concerns in ChatGPT." In Beyond AI. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-45282-6_11.
Full textHuang, Ken, Yang Wang, and Xiaochen Zhang. "Foundations of Generative AI." In Generative AI Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54252-7_1.
Full textHuang, Ken, Grace Huang, Yuyan Duan, and Ju Hyun. "Utilizing Prompt Engineering to Operationalize Cybersecurity." In Generative AI Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54252-7_9.
Full textConference papers on the topic "AI security"
He, Yifeng, Ethan Wang, Yuyang Rong, Zifei Cheng, and Hao Chen. "Security of AI Agents." In 2025 IEEE/ACM International Workshop on Responsible AI Engineering (RAIE). IEEE, 2025. https://doi.org/10.1109/raie66699.2025.00013.
Full textJabbar, Haidar, Samir Al-Janabi, and Francis Syms. "Securing Autonomous Vehicles with Smart AI Security Agents." In 2025 International Conference on New Trends in Computing Sciences (ICTCS). IEEE, 2025. https://doi.org/10.1109/ictcs65341.2025.10989346.
Full textÜnal, Hasan Tolga, Arif Furkan Mendi, Özgür Umut Vurgun, Ömer Özkan, and Mehmet Akif Nacar. "AI – Supported Collective Security System." In 2024 8th International Artificial Intelligence and Data Processing Symposium (IDAP). IEEE, 2024. http://dx.doi.org/10.1109/idap64064.2024.10711160.
Full textvan Oers, Alexander M., and Jorik T. Venema. "Anti-AI camouflage." In Artificial Intelligence for Security and Defence Applications II, edited by Henri Bouma, Yitzhak Yitzhaky, Radhakrishna Prabhu, and Hugo J. Kuijf. SPIE, 2024. http://dx.doi.org/10.1117/12.3031144.
Full textKaplan, Hasan. "Systematic Testing of Security-Related Vulnerabilities in LLM-Based Applications." In 2025 IEEE/ACM 4th International Conference on AI Engineering – Software Engineering for AI (CAIN). IEEE, 2025. https://doi.org/10.1109/cain66642.2025.00043.
Full textTelrandhe, Paras, and Shivani Makhijani. "AI for Healthcare Data Security and Privacy." In 2024 2nd DMIHER International Conference on Artificial Intelligence in Healthcare, Education and Industry (IDICAIEI). IEEE, 2024. https://doi.org/10.1109/idicaiei61867.2024.10842836.
Full textDiyora, Vishal, and Nilesh Savani. "Blockchain or AI: Web Applications Security Mitigations." In 2024 First International Conference on Pioneering Developments in Computer Science & Digital Technologies (IC2SDT). IEEE, 2024. http://dx.doi.org/10.1109/ic2sdt62152.2024.10696861.
Full textAmbati, Sri Haritha, Norah Ridley, Enrico Branca, and Natalia Stakhanova. "Navigating (in)Security of AI-Generated Code." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679468.
Full textP, Sivakumar, Premkumar T, Ani Sowntharya A, Navin S, and Pavithra T. "Mastering Beaglebone AI & AI-64 on its Multifaceted Applications." In 2024 4th International Conference on Soft Computing for Security Applications (ICSCSA). IEEE, 2024. https://doi.org/10.1109/icscsa64454.2024.00124.
Full textVan Ede, Thijs, Trix Mulder, and Evgeni Moyakine. "Interdisciplinary Research Project ‘AI Shield’." In 2024 8th Cyber Security in Networking Conference (CSNet). IEEE, 2024. https://doi.org/10.1109/csnet64211.2024.10851746.
Full textReports on the topic "AI security"
Lewis, Daniel, and Josh Oxby. Energy security and AI. Parliamentary Office of Science and Technology, 2024. https://doi.org/10.58248/pn735.
Full textChristie, Lorna. AI in policing and security. Parliamentary Office of Science and Technology, 2021. http://dx.doi.org/10.58248/hs27.
Full textSherman, Dylan, and Simon Brawley. AI, disinformation and cyber security. Parliamentary Office of Science and Technology, 2025. https://doi.org/10.58248/hs104.
Full textPasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.
Full textBennet, Karen, Gopi Krishnan Rajbahadur, Arthit Suriyawongkul, and Kate Stewart. Implementing AI Bill of Materials (AI BOM) with SPDX 3.0: A Comprehensive Guide to Creating AI and Dataset Bill of Materials. The Linux Foundation, 2024. https://doi.org/10.70828/rned4427.
Full textGehlhaus, Diana. Staying Ahead: Strengthening Tomorrow's U.S. AI and AI-Enabled Workforce. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/20210075.
Full textPasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.
Full textKim, Kyungmee, and Boulanin Vincent. Artificial Intelligence for Climate Security: Possibilities and Challenges. Stockholm International Peace Research Institute, 2023. http://dx.doi.org/10.55163/qdse8934.
Full textMurdick, Dewey, Daniel Chou, Ryan Fedasiuk, and Emily Weinstein. The Public AI Research Portfolio of China’s Security Forces. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/20200057.
Full textMurdick, Dewey, James Dunham, and Jennifer Melot. AI Definitions Affect Policymaking. Center for Security and Emerging Technology, 2020. http://dx.doi.org/10.51593/20200004.
Full text