Get this model
By IBM Developer Staff | Updated September 21, 2018 - Published March 20, 2018
Artificial intelligenceDeep learningSecurity
This model enables adversarial training to learn trivial encryption functions. The model is based on the TensorFlow implementation and the 2016 paper “Learning to Protect Communications with Adversarial Neural Cryptography” by Abadi and Andersen.
This model creates and trains three neural networks, termed Alice, Bob, and Eve. Alice takes inputs in_m (message), in_k (key) and outputs the ciphertext as a string. Bob takes inputs in_k, ciphertext and tries to reconstruct the message. Eve is an adversarial network that takes the ciphertext as its input and also tries to reconstruct the message. The main function attempts to train these networks and then evaluates them, all on random plaintext and key values.
in_m (message), in_k (key)
June 19, 2019
Artificial intelligenceDeep learning+
A process model to map individual technology components to the reference architecture.
Artificial intelligenceData science+
Learn how transfer learning allows you to repurpose models for new problems with less data for training. If you're training…
Back to top