Crypto Makes AI Evolve

AI-generated keywords: Cryptography Artificial Intelligence Secure AI Privacy Security concerns

AI-generated Key Points

  • Adoption of cryptography has greatly influenced the development of Artificial Intelligence (AI)
  • Focus on secure methods to address privacy and security concerns
  • Evolution of secure AI through cryptography defined in five stages: Crypto-Sensitive AI, Crypto-Adapted AI, Crypto-Friendly AI, Crypto-Enabled AI, Crypto-Protected AI
  • Emphasis on the need for a thorough examination and roadmap for future research in secure AI
  • Importance of addressing adversarial attacks as critical threats against ML models
  • Suggestion for further research in quantum-inspired and bio-inspired approaches to enhance security and privacy in artificial intelligence technologies
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Behrouz Zolfaghari (Cyber Science Lab, School of Computer Science, University of Guelph, Ontario, Canada), Elnaz Rabieinejad (Cyber Science Lab, School of Computer Science, University of Guelph, Ontario, Canada), Abbas Yazdinejad (Cyber Science Lab, School of Computer Science, University of Guelph, Ontario, Canada), Reza M. Parizi (College of Computing and Software Engineering, Kennesaw State University, GA, USA), Ali Dehghantanha (Cyber Science Lab, School of Computer Science, University of Guelph, Ontario, Canada)

License: CC BY 4.0

Abstract: Adopting cryptography has given rise to a significant evolution in Artificial Intelligence (AI). This paper studies the path and stages of this evolution. We start with reviewing existing relevant surveys, noting their shortcomings, especially the lack of a close look at the evolution process and solid future roadmap. These shortcomings justify the work of this paper. Next, we identify, define and discuss five consequent stages in the evolution path, including Crypto-Sensitive AI, Crypto-Adapted AI, Crypto-Friendly AI, Crypto-Enabled AI, Crypto-Protected AI. Then, we establish a future roadmap for further research in this area, focusing on the role of quantum-inspired and bio-inspired AI.

Submitted to arXiv on 25 Jun. 2022

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2206.12669v1

The adoption of cryptography has greatly influenced the development of Artificial Intelligence (AI), leading to a focus on secure methods that address privacy and security concerns. This paper examines the evolution of this transformation and emphasizes the need for a thorough examination and roadmap for future research. While previous surveys have focused on specific aspects of security in AI tools such as neural networks, Machine Learning (ML), and Deep Learning (DL), recent work has also explored challenges in mobile services traffic classification and reviewed state-of-the-art image encryption classification models. The paper defines five stages - Crypto-Sensitive AI, Crypto-Adapted AI, Crypto-Friendly AI, Crypto-Enabled AI, Crypto-Protected AI - to provide a detailed analysis of the evolution of secure AI through cryptography. It also highlights the importance of addressing adversarial attacks as critical threats against ML models and suggests further research in quantum-inspired and bio-inspired approaches to enhance security and privacy in artificial intelligence technologies.
Created on 22 Feb. 2024

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.