Fig. 2From: Artificial intelligence and quantum cryptographyAI model evaluation and validationBack to article page