LEADER 04308nam 22007453 450 001 9911007280803321 005 20250207203814.0 010 $a1-83724-442-1 010 $a1-5231-6296-1 010 $a1-83953-548-2 035 $a(MiAaPQ)EBC30663210 035 $a(Au-PeEL)EBL30663210 035 $a(CKB)28528739400041 035 $a(Exl-AI)30663210 035 $a(OCoLC)1405266247 035 $a(EXLCZ)9928528739400041 100 $a20231022d2023 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aArtificial Intelligence for Biometrics and Cybersecurity $eTechnology and Applications 205 $a1st ed. 210 1$aStevenage :$cInstitution of Engineering & Technology,$d2023. 210 4$dİ2023. 215 $a1 online resource (368 pages) 225 1 $aSecurity Series 311 08$a1-83953-547-4 327 $aContents -- About the editors -- Preface -- 1. Introduction | Mohamed Hammad and Ahmed A. Abd El-Latif -- 2. AI in biometrics and cybersecurity | Mohamed Hammad and Ahmed A. Abd El-Latif -- 3. Biometric security performance: analysis methods and tools for evaluation and assessment | Mohamed Hammad and Ahmed A. Abd El-Latif -- 4. Leveraging generative adversarial networks and federated learning for enhanced cybersecurity: a concise review | Mohamed Hammad, Basma Abd El-Rahiem and Ahmed A. Abd El-Latif -- 5. A survey on face recognition methods with federated leaning | Huiting Sun, Jialiang Peng and Zhaogong Zhang -- 6. Artificial intelligence-based biometric authentication using ECG signal | Kiran Kumar Patro, Jaya Prakash Allam, Babji Prasad Chapa, P Lalitha Kumari and Mohamed Hammad -- 7. A comparative analysis of email phishing detection methods: a deep learning perspective | Cong Khoa Truong, Phuc Hao Do and Tran Duc Le -- 8. Securing hardware coprocessors against piracy using biometrics for secured IoT systems | Aditya Anshul, Rahul Chaurasia and Anirban Sengupta -- 9. Intelligent authentication system using graphical one-time passwords | Adarsha Sigdel, Kheng Cher Yeo, Yassine Maleh and Mamoun Alazab -- 10. Role of AI in social cybersecurity: real-world case studies | Mudasir Ahmad Wani, Mohamed Hammad and Ahmed A. Abd El-Latif -- 11. Ethical and privacy concerns and challenges | Mohamed Hammad, Mudasir Ahmad Wani and Ahmed A. Abd El-Latif -- 12. Conclusion | Mohamed Hammad and Ahmed A. Abd El-Latif -- Index$7Generated by AI. 330 $aThis book presents cutting-edge research on the use of AI for biometrics and cybersecurity including Machine and Deep Learning architectures, emerging applications and ethical and legal concerns. 410 0$aSecurity Series 606 $aBiometric identification$xTechnological innovations 606 $aComputer security$xTechnological innovations 606 $aArtificial intelligence$xIndustrial applications 606 $aArtificial intelligence 606 $aIdentification biome?trique$xInnovations 606 $aSe?curite? informatique$xInnovations 606 $aIntelligence artificielle 606 $aIntelligence artificielle$xApplications industrielles 606 $aartificial intelligence$2aat 606 $aArtificial intelligence$2fast 615 0$aBiometric identification$xTechnological innovations. 615 0$aComputer security$xTechnological innovations. 615 0$aArtificial intelligence$xIndustrial applications. 615 0$aArtificial intelligence. 615 6$aIdentification biome?trique$xInnovations. 615 6$aSe?curite? informatique$xInnovations. 615 6$aIntelligence artificielle. 615 6$aIntelligence artificielle$xApplications industrielles. 615 7$aartificial intelligence. 615 7$aArtificial intelligence. 676 $a006.248 700 $aAbd El-Latif$b Ahmed A$01080743 701 $aHammad$b Mohamed$01825197 701 $aMaleh$b Yassine$01734186 701 $aGupta$b Brij B.$f1982-$01734187 701 $aMazurczyk$b Wojciech$01684256 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911007280803321 996 $aArtificial Intelligence for Biometrics and Cybersecurity$94392709 997 $aUNINA