Information Security in AI

A special issue of Symmetry (ISSN 2073-8994). This special issue belongs to the section "Computer".

Deadline for manuscript submissions: 31 January 2025 | Viewed by 15

Special Issue Editors


E-Mail Website
Guest Editor
School of Computer Science, Central China Normal University, Wuhan 430070, China
Interests: symmetric/asymmetric ciphers; Blockchain; AI security
School of Computer Science and Artificial Intelligence, Wuhan University of Technology, Wuhan 430070, China
Interests: cryptographic protocols; provable security; electronic voting
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

In recent years, the application of artificial intelligence (AI) technologies has become increasingly widespread in fields such as autonomous driving, industrial IoT, healthcare, and natural language processing. However, information security issues have become one of the key factors constraining the large-scale application of AI systems. For example, model training requires large amounts of data, but users often hesitate to share their data to protect their privacy, leading to the problem of data silos. This necessitates the development of methods that enable model training without compromising user privacy and also ensuring the trained models are privacy-preserving. Furthermore, using AI methods to identify security vulnerabilities and help enhance the security of information systems is also becoming an effective approach in designing secure systems.

The aim of this Special Issue is to bring together research investigations in identifying information security issues in AI systems, building secure and robust AI protocols and systems, and developing AI-based security enhancement techniques. Authors are invited to submit original research contributions on topics including but not limited to the following:

  • Data, model, and membership inference attacks;
  • Data and model poisoning attacks;
  • Adversarial training and certified robustness;
  • Privacy and security in federated learning;
  • Privacy-preserving computations;
  • Symmetric and asymmetric cryptographic protocols;
  • Key management through symmetric bivariate polynomials;
  • Information security in AI applications;
  • Security and privacy in AIGC;
  • AI-enabled digital investigation;
  • The integration of AI and Blockchain for security critical infrastructures.

Dr. Jiageng Chen
Dr. Zhe Xia
Dr. Chunhua Su
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Symmetry is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • data, model, and membership inference attacks
  • data and model poisoning attacks
  • adversarial training and certified robustness
  • privacy and security in federated learning
  • privacy-preserving computations
  • symmetric and asymmetric cryptographic protocols
  • key management through symmetric bivariate polynomials
  • information security in AI applications
  • security and privacy in AIGC
  • AI-enabled digital investigation
  • the integration of AI and Blockchain for security critical infrastructures.

Published Papers

This special issue is now open for submission.
Back to TopTop