Methodologies for IP protection

Introduction

Past research has shown that over 8 months may elapse between the time a network is compromised and the time the attack is discovered. During this long gap, attackers can steal valuable intellectual property from the victim. ​

Different strategies are required for generating reliable documents that may confuse the attacker by limiting the effects of his action.

Available Theses

  • GAN network for producing reliable fake documents;
  • Multimodal analysis for IP protection;
  • Image analysis for producing reliable fake documents.

Theses In progress

  •  None at the moment

Project & Collaborations

 In progress

References

  • Giancarlo Sperlì (This email address is being protected from spambots. You need JavaScript enabled to view it.)