Deep Learning for Cyber Security

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: 15 August 2024 | Viewed by 7739

Special Issue Editors


E-Mail Website
Guest Editor
Poznan University of Technology, Faculty of Control, Robotics and Electrical Engineering, Institute of Automatic Control and Robotics, 60-965 Poznań, ul. Piotrowo 3A, Poland
Interests: machine learning; deep learning; artificial neural networks; natural language processing; graph neural networks; Petri nets; data mining

E-Mail Website
Guest Editor
Faculty of Electrical Engineering, Automatic Control and Informatics, Opole University of Technology, 45-758 Opole, Poland
Interests: analysis of biomedical data; human–computer interactions; brain–computer interfaces and the use of modern technologies in the diagnosis of neurodegenerative diseases
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
1. Marie Curie-Sklodowska University, ul. Marii Curie-Skłodowskiej 5, 20-400 Lublin, Poland
2. Polish-Japanese Academy of Information Technology, Koszykowa 86 St. 02-008 Warszawa, Poland
Interests: analysis of biomedical data; signal processing; programming; data processing; artificial intelligence

Special Issue Information

Dear Colleagues,

In the rapidly changing realities of the digital society and information-based economy, new threats to the users of new technologies are appearing almost constantly. Starting with attempts at phishing sensitive data and online harassment, moving through to economic espionage, identity theft and blackmail, and ending with attacks on the sensitive architecture of the state—it is plain to see that new technologies require more and more extensive areas of cybersecurity implementation. Juxtaposing this with the increasingly sophisticated vectors of attacks (whether software, hardware or human) and the deep social ignorance regarding the threats lurking on the Web, it can be safely said that the development of a defense apparatus against this is of paramount importance.

It should be remembered that, in principle, the development of security tools is secondary to offensive weapons. Even laboratories preparing proprietary solutions in the privacy of their own are first forced to identify a new attack vector and then find a preventive measure for it. An ideal tool in this case would be a mechanism supporting increasing cyber security—allowing, on the one hand, users to analyze the weaknesses of the protected infrastructure and discover new attack vectors, and on the other hand, to prepare appropriate security measures. Deep learning combined with natural language processing methods may allow the creation of such a tool, thanks to which the possibilities of active defense will finally be able to develop their wide potential.

This Special Issue aims to publish studies on the following areas (although articles may address additional or alternative concerns):

  1. Cyber security issues;
  2. Deep learning methods for cyber security;
  3. Artifcial intelligence in IoT;
  4. Industry 4.0 and cyber security.

We look forward to receiving your contributions.

Prof. Dr. Aleksandra Świetlicka
Prof. Dr. Aleksandra Kawala-Sterniuk
Dr. Piotr Schneider
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • deep learning
  • cyber security
  • Internet of Things
  • artificial intelligence
  • neural networks
  • Industry 4.0

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

16 pages, 272 KiB  
Article
Ethical Challenges in the Development of Virtual Assistants Powered by Large Language Models
by Andrés Piñeiro-Martín, Carmen García-Mateo, Laura Docío-Fernández and María del Carmen López-Pérez
Electronics 2023, 12(14), 3170; https://doi.org/10.3390/electronics12143170 - 21 Jul 2023
Cited by 7 | Viewed by 6425
Abstract
Virtual assistants (VAs) have gained widespread popularity across a wide range of applications, and the integration of Large Language Models (LLMs), such as ChatGPT, has opened up new possibilities for developing even more sophisticated VAs. However, this integration poses new ethical issues and [...] Read more.
Virtual assistants (VAs) have gained widespread popularity across a wide range of applications, and the integration of Large Language Models (LLMs), such as ChatGPT, has opened up new possibilities for developing even more sophisticated VAs. However, this integration poses new ethical issues and challenges that must be carefully considered, particularly as these systems are increasingly used in public services: transfer of personal data, decision-making transparency, potential biases, and privacy risks. This paper, an extension of the work presented at IberSPEECH 2022, analyzes the current regulatory framework for AI-based VAs in Europe and delves into ethical issues in depth, examining potential benefits and drawbacks of integrating LLMs with VAs. Based on the analysis, this paper argues that the development and use of VAs powered by LLMs should be guided by a set of ethical principles that prioritize transparency, fairness, and harm prevention. The paper presents specific guidelines for the ethical use and development of this technology, including recommendations for data privacy, bias mitigation, and user control. By implementing these guidelines, the potential benefits of VAs powered by LLMs can be fully realized while minimizing the risks of harm and ensuring that ethical considerations are at the forefront of the development process. Full article
(This article belongs to the Special Issue Deep Learning for Cyber Security)
18 pages, 2991 KiB  
Article
Dual Reversible Data Hiding in Encrypted Halftone Images Using Matrix Encoding
by Cheonshik Kim, Nhu-Ngoc Dao, Ki-Hyun Jung and Lu Leng
Electronics 2023, 12(14), 3134; https://doi.org/10.3390/electronics12143134 - 19 Jul 2023
Cited by 2 | Viewed by 936
Abstract
Data hiding and reversible data hiding research has primarily focused on grayscale and color images, because binary and halftone images are prone to visual distortion caused by a small number of errors in pixel representation. As a result, reversible data hiding is more [...] Read more.
Data hiding and reversible data hiding research has primarily focused on grayscale and color images, because binary and halftone images are prone to visual distortion caused by a small number of errors in pixel representation. As a result, reversible data hiding is more useful than halftone-based data hiding. This study proposes an investigation of encrypted halftone images based on dual reversible data hiding, which improves the reversibility and security of the image by utilizing a dual cover image. Since halftone images are adequately compressed, they are beneficial in low-channel-bandwidth environments. Hamming code (HC) (7,4) is applied to each block of the halftone image to hide the secret data, and two halftone images are recorded and sent to different receivers at the end of the embedding process. Recipients can use the proposed method and the two marked images to extract the message and recover the cover halftone image. The proposed data hiding method can enhance the quality of the decrypted image by appropriately increasing the block size, and conversely, sufficiently large amounts of data can be hidden by reducing the block size. The experimental results provide evidence of the effectiveness of the proposed method in terms of both image quality and the embedding rate. Full article
(This article belongs to the Special Issue Deep Learning for Cyber Security)
Show Figures

Figure 1

Back to TopTop