Publisher
Springer Nature Singapore
Reference18 articles.
1. Dhilung Kirat JJ, Stoecklin MP (2018) Deeplocker: concealing targeted attacks with AI locksmithing. Blackhat USA, pp 1–29
2. Wang Z, Liu C, Cui X, Yin J, Liu J, Wu D, Liu Q (2022) DeepC2: AI-powered covert command and control on OSNs. International conference on information and communications security. Springer, Cham, pp 394–414
3. Chandu NS, Subramanian N (2022) Countering steganographic security with CNN. In: Proceedings of the 2022 10th international symposium on digital forensics and security (ISDFS). IEEE, pp 1–6
4. Chanchal M, Malathi P, Kumar G (2020) A comprehensive survey on neural network based image data hiding scheme. In: Proceedings of the 2020 fourth international conference on I-SMAC (IoT in social, mobile, analytics and cloud). IEEE, pp 1245–1249
5. Liu T, Liu Z, Liu Q, Wen W, Xu W, Li M (2020) Stegonet: turn deep neural network into a stegomalware. In: Annual computer security applications conference, pp 928–938