Artificial Neural Synchronization Using Nature Inspired Whale Optimization
暂无分享,去创建一个
Subhendu Kumar Pani | Chinmay Chakraborty | Arindam Sarkar | Abdulfattah Noorwali | Mohammad Zubair Khan | Moirangthem Marjit Singh | Arindam Sarkar | Chinmay Chakraborty | S. Pani | Abdulfattah Noorwali
[1] Tingwen Huang,et al. Approach to design neural cryptography: a generalized architecture and a heuristic rule. , 2013, Physical review. E, Statistical, nonlinear, and soft matter physics.
[2] Michal Dolecki,et al. Threshold Method of Detecting Long-Time TPM Synchronization , 2013, CISIM.
[3] Christian Van den Broeck,et al. Statistical Mechanics of Learning , 2001 .
[4] Zhigang Zeng,et al. Global Exponential Stability and Synchronization for Discrete-Time Inertial Neural Networks With Time Delays: A Timescale Approach , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[5] Tingwen Huang,et al. Neural Cryptography Based on Complex-Valued Neural Network , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[6] Jinde Cao,et al. Novel Finite-Time Synchronization Criteria for Inertial Neural Networks With Time Delays via Integral Inequality Method , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[7] Cheng-Chew Lim,et al. Cluster Synchronization for Neutral Stochastic Delay Networks via Intermittent Adaptive Control , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[8] I Kanter,et al. Confidence in prediction by neural networks. , 1999, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.
[9] Vinod Patidar,et al. A Pseudo Random Bit Generator Based on Chaotic Logistic Map and its Statistical Testing , 2009, Informatica.
[10] Zhen Ni,et al. A Multistage Game in Smart Grid Security: A Reinforcement Learning Solution , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[11] S. Santhanalakshmi,et al. Analysis of Neural Synchronization Using Genetic Approach for Secure Key Generation , 2015, SSCC.
[12] Wolfgang Kinzel,et al. Interacting Neural Networks and Cryptography , 2002 .
[13] Chee Peng Lim,et al. Synchronization of an Inertial Neural Network With Time-Varying Delays and Its Application to Secure Communication , 2018, IEEE Transactions on Neural Networks and Learning Systems.
[14] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[15] Adi Shamir,et al. Analysis of Neural Cryptography , 2002, ASIACRYPT.
[16] Jing Zhang,et al. Chaotic multimedia stream cipher scheme based on true random sequence combined with tree parity machine , 2017, Multimedia Tools and Applications.
[17] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[18] Haruna Chiroma,et al. Whale optimization algorithm: a systematic review of contemporary applications, modifications and developments , 2020, Neural Computing and Applications.
[19] Tao Dong,et al. Event-triggered synchronization strategy for complex dynamical networks with the Markovian switching topologies , 2016, Neural Networks.
[20] Lingfeng Liu,et al. Pseudorandom bit generator based on non-stationary logistic maps , 2016, IET Inf. Secur..
[21] J. K. Mandal,et al. Computational Intelligence Based Neural Session Key Generation on E-Health System for Ischemic Heart Disease Information Sharing , 2018, Advances in Intelligent Systems and Computing.
[22] Jia Wang,et al. Multivariate Cryptography Based on Clipped Hopfield Neural Network , 2018, IEEE Transactions on Neural Networks and Learning Systems.
[23] Hazem M. Abbas,et al. Authenticated key exchange protocol using neural cryptography with secret boundaries , 2013, The 2013 International Joint Conference on Neural Networks (IJCNN).
[24] Hector Gomez,et al. A 65 nm CMOS key establishment core based on tree parity machines , 2017, Integr..
[25] Tingwen Huang,et al. Passivity and Synchronization of Coupled Uncertain Reaction–Diffusion Neural Networks With Multiple Time Delays , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[26] Marcin Niemiec,et al. Error correction in quantum cryptography based on artificial neural networks , 2018, Quantum Inf. Process..
[27] Mattia Frasca,et al. A true random bit generator based on a memristive chaotic circuit: Analysis, design and FPGA implementation , 2019, Chaos, Solitons & Fractals.
[28] Xiaofeng Liao,et al. An Approach for Designing Neural Cryptography , 2013, ISNN.
[29] Arindam Sarkar,et al. Multilayer neural network synchronized secured session key based encryption in wireless communication , 2019, Indonesian Journal of Electrical Engineering and Computer Science.
[30] A. Kanso,et al. Logistic chaotic maps for binary numbers generations , 2009 .
[31] Neural synchronization and cryptography , 2006 .
[32] J. K. Mandal,et al. Key Generation and Certification using Multilayer Perceptron in Wireless communication(KGCMLP) , 2012, ArXiv.
[33] W. Kinzel,et al. Secure exchange of information by synchronization of neural networks , 2002 .
[34] Michal Dolecki,et al. The Impact of the TPM Weights Distribution on Network Synchronization Time , 2015, CISIM.
[35] Peng Shi,et al. Exponential Synchronization for Markovian Stochastic Coupled Neural Networks of Neutral-Type via Adaptive Feedback Control , 2017, IEEE Transactions on Neural Networks and Learning Systems.
[36] Sunil Karforma,et al. Neural soft computing based secured transmission of intraoral gingivitis image in e-health care , 2019, Indonesian Journal of Electrical Engineering and Computer Science.
[37] Andreas Ruttor,et al. Genetic attack on neural cryptography. , 2006, Physical review. E, Statistical, nonlinear, and soft matter physics.
[38] Zhigang Zeng,et al. Global Synchronization of Coupled Fractional-Order Recurrent Neural Networks , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[39] Wolfgang Kinzel,et al. Cryptography based on neural networks—analytical results , 2002 .
[40] Xiaofeng Liao,et al. Event-triggered synchronization for reaction–diffusion complex networks via random sampling , 2018 .