Work on training neural networks for real time encryption in multi-agent transmission and multiple adversaries. Trained LSTMs, RNN's and CNN's, Alice and Bob who transmit data protecting it from multiple adversaries trying various adversarial attacks of another network Eve.
Verious Implementation of Adam, Eve, and Bob
- CNN implementations
- RNN implementations
- LSTM
- Key leak
- Multiple advesaries
- Security Analysis
- Chi2 and KS tests
- Encoding