{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T21:10:32Z","timestamp":1758057032783,"version":"3.44.0"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T00:00:00Z","timestamp":1755561600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T00:00:00Z","timestamp":1755561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s10586-025-05637-x","type":"journal-article","created":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T14:41:25Z","timestamp":1755614485000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Quantum neural computing enhanced five-dimensional hyperchaotic framework for secured and reliable communication on the Internet of Things systems"],"prefix":"10.1007","volume":"28","author":[{"given":"Mu","family":"Chen","sequence":"first","affiliation":[]},{"given":"Sarbajit","family":"Manna","sequence":"additional","affiliation":[]},{"given":"Arindam","family":"Sarkar","sequence":"additional","affiliation":[]},{"given":"Abdulfattah","family":"Noorwali","sequence":"additional","affiliation":[]},{"given":"Kamal M.","family":"Othman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,19]]},"reference":[{"key":"5637_CR1","doi-asserted-by":"crossref","unstructured":"Akter, M.S., Rodriguez-Cardenas, J., Shahriar, H., Cuzzocrea, A., Wu, F.: Quantum Cryptography for Enhanced Network Security: A Comprehensive Survey of Research, Developments, and Future Directions. In and others, editor, 2023 IEEE International Conference on Big Data (BigData), Sorrento, Italy, pages 5408\u20135417, (2023)","DOI":"10.1109\/BigData59044.2023.10386889"},{"issue":"12","key":"5637_CR2","doi-asserted-by":"crossref","first-page":"7082","DOI":"10.3390\/app13127082","volume":"13","author":"A Aldoseri","year":"2023","unstructured":"Aldoseri, A., Al-Khalifa, K.N., Hamouda, A.M.: Re-thinking data strategy and integration for artificial intelligence: concepts, opportunities, and challenges. Appl. Sci. 13(12), 7082\u20137082 (2023)","journal-title":"Appl. Sci."},{"issue":"24","key":"5637_CR3","doi-asserted-by":"crossref","first-page":"11784","DOI":"10.3390\/app112411784","volume":"11","author":"H Alyami","year":"2021","unstructured":"Alyami, H.: The evaluation of software security through quantum computing techniques: a durability perspective. Appl. Sci. 11(24), 11784\u201311784 (2021)","journal-title":"Appl. Sci."},{"key":"5637_CR4","doi-asserted-by":"crossref","first-page":"106896","DOI":"10.1016\/j.infsof.2022.106896","volume":"147","author":"U Awan","year":"2022","unstructured":"Awan, U., Hannola, L., Tandon, A., Goyal, R.K., Dhir, A.: Quantum computing challenges in the software industry. A fuzzy AHP-based approach. Inf. Softw. Technol. 147, 106896\u2013106896 (2022)","journal-title":"Inf. Softw. Technol."},{"issue":"3","key":"5637_CR5","doi-asserted-by":"crossref","first-page":"28","DOI":"10.3390\/data7030028","volume":"7","author":"O Ayoade","year":"2022","unstructured":"Ayoade, O., Rivas, P., Orduz, J.: Artificial intelligence computing at the quantum level. Data 7(3), 28\u201328 (2022)","journal-title":"Data"},{"issue":"P1","key":"5637_CR6","first-page":"7","volume":"560","author":"CH Bennett","year":"2020","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560(P1), 7\u201311 (2020)","journal-title":"Theor. Comput. Sci."},{"key":"5637_CR7","doi-asserted-by":"crossref","first-page":"8066","DOI":"10.1109\/TIFS.2024.3414255","volume":"19","author":"C Chen","year":"2024","unstructured":"Chen, C., Cui, J., Qu, G., Zhang, J.: Write+Sync: Software Cache Write Covert Channels Exploiting Memory-Disk Synchronization. IEEE Trans. Inf. Forensics Secur. 19, 8066\u20138078 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"5637_CR8","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1109\/MNET.2024.3350025","volume":"38","author":"P Chen","year":"2024","unstructured":"Chen, P., Luo, L., Guo, D., Tang, G., Zhao, B., Li, Y., Luo, X.: Why and How Lasagna Works: A New Design of Air-Ground Integrated Infrastructure. IEEE Network 38(2), 132\u2013140 (2024)","journal-title":"IEEE Network"},{"key":"5637_CR9","doi-asserted-by":"crossref","unstructured":"Cheng, G., Wang, C., Chen, H.: A novel color image encryption algorithm based on hyperchaotic system and permutation-diffusion architecture. International Journal of Bifurcation and Chaos, 29(9), (2019)","DOI":"10.1142\/S0218127419501153"},{"issue":"4","key":"5637_CR10","doi-asserted-by":"crossref","first-page":"3092","DOI":"10.1109\/TMC.2024.3503632","volume":"24","author":"M Dai","year":"2025","unstructured":"Dai, M., Sun, G., Yu, H., Wang, S., Niyato, D.: User Association and Channel Allocation in 5G Mobile Asymmetric Multi-Band Heterogeneous Networks. IEEE Trans. Mob. Comput. 24(4), 3092\u20133109 (2025)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"5637_CR11","doi-asserted-by":"crossref","unstructured":"Deng, Q., Wang, C.: Multi-scroll hidden attractors with two stable equilibrium points. Chaos, 29(9), (2019)","DOI":"10.1063\/1.5116732"},{"issue":"11","key":"5637_CR12","doi-asserted-by":"crossref","first-page":"335","DOI":"10.3390\/fi14110335","volume":"14","author":"A Elaziz","year":"2022","unstructured":"Elaziz, A., Raheman, F.: The future of cybersecurity in the age of quantum computers. Fut Internet 14(11), 335\u2013335 (2022)","journal-title":"Fut Internet"},{"key":"5637_CR13","doi-asserted-by":"crossref","unstructured":"Ghubaish, A, Salman, T, Zolanvari, M, Unal, D, Al-Ali, A.K., Jain, R.: Recent advances in the internet of medical things (IoMT) systems security. IEEE Internet Things J, 1, (2020)","DOI":"10.1109\/JIOT.2020.3045653"},{"key":"5637_CR14","doi-asserted-by":"crossref","first-page":"100514","DOI":"10.1016\/j.iot.2022.100514","volume":"19","author":"Minxian Sukhpal Singh Gill","year":"2022","unstructured":"Gill, Minxian Sukhpal Singh., Carlo, Xu., Ottaviani, Panos, Patros, Rami, Bahsoon, Arash, Shaghaghi, Muhammed: AI for next generation computing: Emerging trends and future directions. Internet of Things 19, 100514\u2013100514 (2022)","journal-title":"Internet of Things"},{"issue":"9","key":"5637_CR15","doi-asserted-by":"crossref","first-page":"5532","DOI":"10.1109\/TCOMM.2024.3392795","volume":"72","author":"Y Gong","year":"2024","unstructured":"Gong, Y., Yao, H., Liu, X., Bennis, M., Nallanathan, A., Han, Z.: Computation and Privacy Protection for Satellite-Ground Digital Twin Networks. IEEE Trans. Commun. 72(9), 5532\u20135546 (2024)","journal-title":"IEEE Trans. Commun."},{"key":"5637_CR16","doi-asserted-by":"crossref","unstructured":"Guo, R., Yang, G., Shi, H., Zhang, Y., Zheng, D.: O-r-cp-abe: An efficient and revocable attribute-based encryption scheme in the cloud-assisted IoMT system. IEEE Internet Things J, 1, (2021)","DOI":"10.1109\/JIOT.2021.3055541"},{"key":"5637_CR17","doi-asserted-by":"crossref","first-page":"102544","DOI":"10.1016\/j.technovation.2022.102544","volume":"120","author":"S Gupta","year":"2023","unstructured":"Gupta, S., Modgil, S., Bhatt, P.C., Chiappetta Jabbour, C.J., Kamble, S.: Quantum computing led innovation for achieving a more sustainable Covid-19 healthcare industry. Technovation 120, 102544\u2013102544 (2023)","journal-title":"Technovation"},{"issue":"1","key":"5637_CR18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42979-019-0027-7","volume":"1","author":"L Gyongyosi","year":"2020","unstructured":"Gyongyosi, L., Imre, S.: Secret key rate adaption for multicarrier continuous-variable quantum key distribution. SN Comput Sci 1(1), 1\u201317 (2020)","journal-title":"SN Comput Sci"},{"key":"5637_CR19","doi-asserted-by":"crossref","first-page":"104107","DOI":"10.1016\/j.ipm.2025.104107","volume":"62","author":"J Hao","year":"2025","unstructured":"Hao, J., Chen, P., Chen, J., Li, X.: Effectively detecting and diagnosing distributed multivariate time series anomalies via Unsupervised Federated Hypernetwork. Inf. Process. Manage. 62, 104107\u2013104107 (2025)","journal-title":"Inf. Process. Manage."},{"key":"5637_CR20","first-page":"1","volume":"74","author":"P Hao","year":"2025","unstructured":"Hao, P., Yan, Z., Wen, H.: Privacy-Preserving NILM: A Self-Alignment Source-Aware Domain Adaptation Approach. IEEE Trans. Instrum. Meas. 74, 1\u201312 (2025)","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"5637_CR21","doi-asserted-by":"crossref","unstructured":"Hatzivasilis, G., Soultatos, O., Ioannidis, S., Verikoukis, C., Demetriou, G., Tsatsoulis, C.: Review of security and privacy for the internet of medical things (IoMT). 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), pages 457\u2013464, (2019)","DOI":"10.1109\/DCOSS.2019.00091"},{"issue":"10","key":"5637_CR22","doi-asserted-by":"crossref","first-page":"2970","DOI":"10.1109\/JSAC.2024.3414597","volume":"42","author":"J Hu","year":"2024","unstructured":"Hu, J., Jiang, H., Chen, S., Zhang, Q., Xiao, Z., Liu, D., Li, B.: WiShield: Privacy Against Wi-Fi Human Tracking. IEEE J. Sel. Areas Commun. 42(10), 2970\u20132984 (2024)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"10","key":"5637_CR23","doi-asserted-by":"crossref","first-page":"9708","DOI":"10.1109\/TMC.2024.3368331","volume":"23","author":"H Jiang","year":"2024","unstructured":"Jiang, H., Ji, P., Zhang, T., Cao, H., Liu, D.: Two-Factor Authentication for Keyless Entry System via Finger-Induced Vibrations. IEEE Trans. Mob. Comput. 23(10), 9708\u20139720 (2024)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"07","key":"5637_CR24","doi-asserted-by":"crossref","first-page":"2550086","DOI":"10.1142\/S0218127425500865","volume":"35","author":"W Jin","year":"2025","unstructured":"Jin, W., Adamatzky, A.: Analysis of Parameter Space, Bifurcation and Symbolic Dynamics of Evolutionary Strategies on a One-Dimensional Regular Lattice. International Journal of Bifurcation and Chaos 35(07), 2550086\u20132550086 (2025)","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"5637_CR25","doi-asserted-by":"crossref","unstructured":"Killoran, N., Bromley, Thomas R., Arrazola, J.M., Schuld, M., Quesada, N., Lloyd, S.: Continuous-variable quantum neural networks. Phys. Rev. Research, 1, (2019)","DOI":"10.1103\/PhysRevResearch.1.033063"},{"key":"5637_CR26","doi-asserted-by":"crossref","unstructured":"Killoran, N., Izaac, J., Quesada, N., Bergholm, V., Amy, M., Weedbrook, C.: Strawberry Fields: A Software Platform for Photonic Quantum Computing. Quantum Journal, 3:129, (2019)","DOI":"10.22331\/q-2019-03-11-129"},{"issue":"2","key":"5637_CR27","first-page":"1","volume":"2","author":"M Kop","year":"2023","unstructured":"Kop, M.: Quantum-ELSPI: a novel field of research. Digit Soc 2(2), 1\u201317 (2023)","journal-title":"Digit Soc"},{"key":"5637_CR28","doi-asserted-by":"crossref","unstructured":"Koutras, D., Stergiopoulos, G., Dasaklis, T., Kotzanikolaou, P., Glynos, D., Douligeris, C.: Security in IoMT communications: A survey. Sensors, 20(17):4828\u20134828, (2020)","DOI":"10.3390\/s20174828"},{"key":"5637_CR29","doi-asserted-by":"crossref","first-page":"100242","DOI":"10.1016\/j.array.2022.100242","volume":"15","author":"M Kumar","year":"2022","unstructured":"Kumar, M.: Post-quantum cryptography Algorithm\u2019s standardization and performance analysis. Array 15, 100242\u2013100242 (2022)","journal-title":"Array"},{"key":"5637_CR30","doi-asserted-by":"crossref","unstructured":"Kumar, R., Tripathi, R.: Towards design and implementation of security and privacy framework for internet of medical things (IoMT) by leveraging blockchain and ipfs technology. J. Supercomput, pages 1\u201340, (2021)","DOI":"10.1007\/s11227-020-03570-x"},{"key":"5637_CR31","doi-asserted-by":"crossref","first-page":"5944","DOI":"10.1109\/TASE.2024.3434610","volume":"22","author":"L Li","year":"2025","unstructured":"Li, L., Cherouat, A., Snoussi, H., Wang, T.: Grasping With Occlusion-Aware Ally Method in Complex Scenes. IEEE Trans. Autom. Sci. Eng. 22, 5944\u20135954 (2025)","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"5637_CR32","doi-asserted-by":"crossref","unstructured":"Li, T., Kouyoumdjieva, S.T., Karlsson, G., Hui, P.: Data collection and node counting by opportunistic communication. In and others, editor, IFIP Networking Conference, (2019)","DOI":"10.23919\/IFIPNetworking46909.2019.8999476"},{"issue":"4","key":"5637_CR33","first-page":"1481","volume":"10","author":"T Li","year":"2016","unstructured":"Li, T., Xiao, Z., Georges, H., Luo, Z., Wang, D.: Performance Analysis of Co- and Cross-tier Device-to-Device Communication Underlaying Macro-small Cell Wireless Networks. KSII Trans. Internet Inf. Syst. 10(4), 1481\u20131500 (2016)","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"5637_CR34","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1016\/j.comcom.2020.07.006","volume":"160","author":"S Liaqat","year":"2020","unstructured":"Liaqat, S., Akhunzada, A., Shaikh, F.S., Giannetsos, A., Jan, M.A.: SDN Orchestration to combat evolving cyber threats in internet of medical things (IoMT). Comput. Commun. 160, 697\u2013705 (2020)","journal-title":"Comput. Commun."},{"key":"5637_CR35","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1007\/s11071-022-07630-0","volume":"110","author":"H Lin","year":"2022","unstructured":"Lin, H., Wang, C., Cui, L.: Hyperchaotic memristive ring neural network and application in medical image encryption. Nonlinear Dyn. 110, 841\u2013855 (2022)","journal-title":"Nonlinear Dyn."},{"key":"5637_CR36","doi-asserted-by":"crossref","first-page":"112445","DOI":"10.1016\/j.asoc.2024.112445","volume":"167","author":"L Lin","year":"2024","unstructured":"Lin, L., Liu, J., Huang, N., Li, S., Zhang, Y.: Multiscale spatio-temporal feature fusion based non-intrusive appliance load monitoring for multiple industrial industries. Appl. Soft Comput. 167, 112445\u2013112445 (2024)","journal-title":"Appl. Soft Comput."},{"issue":"6","key":"5637_CR37","doi-asserted-by":"crossref","first-page":"2043","DOI":"10.1002\/rnc.7777","volume":"35","author":"Y Liu","year":"2025","unstructured":"Liu, Y., Li, W., Dong, X., Ren, Z.: Resilient Formation Tracking for Networked Swarm Systems Under Malicious Data Deception Attacks. Int. J. Robust Nonlinear Control 35(6), 2043\u20132052 (2025)","journal-title":"Int. J. Robust Nonlinear Control"},{"key":"5637_CR38","unstructured":"Lovic, V.: Quantum key distribution: advantages, challenges and policy 2020. Cambridge Journal of Science and Policy, (2020)"},{"issue":"6","key":"5637_CR39","doi-asserted-by":"crossref","first-page":"5372","DOI":"10.1109\/TNET.2024.3462539","volume":"32","author":"H Luo","year":"2024","unstructured":"Luo, H., Zhang, Q., Sun, G., Yu, H., Niyato, D.: Symbiotic Blockchain Consensus: Cognitive Backscatter Communications-Enabled Wireless Blockchain Consensus. IEEE\/ACM Trans. Networking 32(6), 5372\u20135387 (2024)","journal-title":"IEEE\/ACM Trans. Networking"},{"issue":"2","key":"5637_CR40","doi-asserted-by":"crossref","first-page":"93","DOI":"10.22603\/ssrr.2021-0251","volume":"6","author":"GM Mallow","year":"2022","unstructured":"Mallow, G.M., Hornung, A., Barajas, J.N., Rudisill, S.S., An, H.S., Samartzis, D.: Quantum computing: the future of big data and artificial intelligence in spine. Spine Surg Relat Res 6(2), 93\u201393 (2022)","journal-title":"Spine Surg Relat Res"},{"key":"5637_CR41","doi-asserted-by":"crossref","unstructured":"Venkata Nagarjun, A.., Rajkumar, S.: Design of an Anomaly Detection Framework for Delay and Privacy-Aware Blockchain-Based Cloud Deployments. IEEE Access, 12:84843\u201384862, (2024)","DOI":"10.1109\/ACCESS.2024.3414998"},{"key":"5637_CR42","doi-asserted-by":"crossref","unstructured":"Venkata Nagarjun, A., Rajkumar, S.: Exploring the Potential of Deep Learning and Blockchain for Intrusion Detection Systems: A Comprehensive Review. Journal of Circuits, Systems and Computers, pages 2430007\u20132430007, (2024)","DOI":"10.1142\/S0218126624300071"},{"key":"5637_CR43","doi-asserted-by":"crossref","unstructured":"Papaioannou, M., Karageorgou, M., Mantas, G., Sucasas, V., Essop, I., Rodriguez, J., Lymberopoulos, D.: A survey on security threats and countermeasures in internet of medical things (iomt). Trans. Emerg. Telecommun. Technol, pages 4049\u20134049, (2020)","DOI":"10.1002\/ett.4049"},{"issue":"2","key":"5637_CR44","doi-asserted-by":"crossref","first-page":"2190","DOI":"10.1109\/TII.2023.3280337","volume":"20","author":"Y Qiao","year":"2024","unstructured":"Qiao, Y., L\u00fc, J., Wang, T., Liu, K., Zhang, B., Snoussi, H.: A Multihead Attention Self-Supervised Representation Model for Industrial Sensors Anomaly Detection. IEEE Trans. Industr. Inf. 20(2), 2190\u20132199 (2024)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"2","key":"5637_CR45","doi-asserted-by":"crossref","first-page":"905","DOI":"10.3390\/app15020905","volume":"15","author":"R Qiu","year":"2025","unstructured":"Qiu, R., Yin, Y., Su, Q., Guan, T.: Func-Bagging: An Ensemble Learning Strategy for Improving the Performance of Heterogeneous Anomaly Detection Models. Appl. Sci. 15(2), 905\u2013905 (2025)","journal-title":"Appl. Sci."},{"key":"5637_CR46","doi-asserted-by":"crossref","first-page":"271","DOI":"10.3390\/s22218151","volume":"22","author":"S Shamshad","year":"2022","unstructured":"Shamshad, S., Riaz, F., Riaz, R., Rizvi, S.S., Abdulla, S.: An enhanced architecture to resolve public-key cryptographic issues in the internet of things (IoT), employing quantum computing supremacy. Sensors (basel) 22, 271\u2013277 (2022)","journal-title":"Sensors (basel)"},{"issue":"6","key":"5637_CR47","doi-asserted-by":"crossref","first-page":"4125","DOI":"10.1109\/TSC.2024.3478730","volume":"17","author":"G Sun","year":"2024","unstructured":"Sun, G., Wang, Y., Yu, H., Guizani, M.: Proportional Fairness-Aware Task Scheduling in Space-Air-Ground Integrated Networks. IEEE Trans. Serv. Comput. 17(6), 4125\u20134137 (2024)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"5637_CR48","doi-asserted-by":"crossref","unstructured":"Tang, D., Dai, R., Zuo, C., Chen, J., Li, K., Qin, Z.: A Low-rate DoS Attack Mitigation Scheme Based on Port and Traffic State in SDN. IEEE Transactions on Computers, pages 1\u201313, (2025)","DOI":"10.1109\/TC.2025.3541143"},{"issue":"9","key":"5637_CR49","doi-asserted-by":"crossref","first-page":"3767","DOI":"10.3390\/app11093767","volume":"11","author":"CW Tsai","year":"2021","unstructured":"Tsai, C.W., Yang, C.W., Lin, J., Chang, Y.C., Chang, R.S.: Quantum key distribution networks: challenges and future research issues in security. Appl. Sci. 11(9), 3767\u20133767 (2021)","journal-title":"Appl. Sci."},{"key":"5637_CR50","doi-asserted-by":"crossref","unstructured":"Wang, S., Wang, C., Xu C.: An image encryption algorithm based on a hidden attractor chaos system and the Knuth-Durstenfeld algorithm. Optics and Lasers in Engineering, 128, (2020)","DOI":"10.1016\/j.optlaseng.2019.105995"},{"key":"5637_CR51","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1007\/s12083-024-01842-4","volume":"18","author":"G Xu","year":"2025","unstructured":"Xu, G., Xu, S., Cao, Y., Xiao, K., Mao, Y., Chen, X., Yu, S.: AAQ-PEKS: An Attribute-based Anti-Quantum Public Key Encryption Scheme with Keyword Search for E-healthcare Scenarios. Peer-to-Peer Networking and Applications 18, 64\u201364 (2025)","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"5637_CR52","doi-asserted-by":"crossref","first-page":"112649","DOI":"10.1016\/j.asoc.2024.112649","volume":"169","author":"Y Yang","year":"2024","unstructured":"Yang, Y., Li, H.: Neural Ordinary Differential Equations for Robust Parameter Estimation in Dynamic Systems with Physical Priors. Appl. Soft Comput. 169, 112649\u2013112649 (2024)","journal-title":"Appl. Soft Comput."},{"key":"5637_CR53","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1016\/j.neucom.2019.03.053","volume":"350","author":"F Yu","year":"2019","unstructured":"Yu, F., Liu, L., Xiao, L., Li, K., Cai, S.: A robust and fixed time zeroing neural dynamics for computing time-variant nonlinear equation using a novel nonlinear activation function. Neurocomputing 350, 108\u2013116 (2019)","journal-title":"Neurocomputing"},{"key":"5637_CR54","doi-asserted-by":"crossref","unstructured":"Yu, F., Qian, S., Chen, X.: A new 4D four-wing memristive hyperchaotic system: dynamical analysis, electronic circuit design, shape synchronization and secure communication. International Journal of Bifurcation and Chaos, (2020)","DOI":"10.1142\/S0218127420501473"},{"key":"5637_CR55","first-page":"2020","volume":"16\u201316","author":"F Yu","year":"2020","unstructured":"Yu, F., Zhang, Z., Liu, L.: Secure communication scheme based on a new 5D multistable four-wing memristive hyperchaotic system with disturbance inputs. Complexity 16\u201316, 2020 (2020)","journal-title":"Complexity"},{"issue":"1","key":"5637_CR56","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s11265-025-01954-x","volume":"97","author":"X Zenggang","year":"2025","unstructured":"Zenggang, X., Qiangqiang, L., Youfeng, L., Hao, C., Xuemin, Z., Yuan, L., Jing, L.: NDLSC: A New Deep Learning-based Approach to Smart Contract Vulnerability Detection. Journal of Signal Processing Systems 97(1), 49\u201368 (2025)","journal-title":"Journal of Signal Processing Systems"},{"issue":"2","key":"5637_CR57","doi-asserted-by":"crossref","first-page":"1300","DOI":"10.1109\/TIT.2023.3340147","volume":"70","author":"M Zhang","year":"2024","unstructured":"Zhang, M., Wei, E., Berry, R., Huang, J.: Age-Dependent Differential Privacy. IEEE Trans. Inf. Theory 70(2), 1300\u20131319 (2024)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"5637_CR58","doi-asserted-by":"crossref","first-page":"2159","DOI":"10.1007\/s11071-019-05113-3","volume":"97","author":"X Zhang","year":"2019","unstructured":"Zhang, X., Wang, C., Yao, W., Lin, H.: Chaotic system with bond orbital attractors. Nonlinear Dyn. 97(4), 2159\u20132174 (2019)","journal-title":"Nonlinear Dyn."},{"issue":"1","key":"5637_CR59","doi-asserted-by":"crossref","first-page":"1239","DOI":"10.1109\/TVT.2023.3304707","volume":"73","author":"Y Zhang","year":"2024","unstructured":"Zhang, Y., Hong, Y., Guizani, M., Wu, S., Zhang, P., Liu, R.: A Multi-Layer Information Dissemination Model and Interference Optimization Strategy for Communication Networks in Disaster Areas. IEEE Trans. Veh. Technol. 73(1), 1239\u20131252 (2024)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"5637_CR60","doi-asserted-by":"crossref","first-page":"112617","DOI":"10.1016\/j.knosys.2024.112617","volume":"305","author":"H Zhao","year":"2024","unstructured":"Zhao, H., Gong, Z., Gan, K., Gan, Y., Xing, H., Wang, S.: Supervised kernel principal component analysis-polynomial chaos-Kriging for high-dimensional surrogate modelling and optimization. Knowl.-Based Syst. 305, 112617\u2013112617 (2024)","journal-title":"Knowl.-Based Syst."},{"key":"5637_CR61","doi-asserted-by":"crossref","first-page":"112352","DOI":"10.1016\/j.jss.2025.112352","volume":"222","author":"W Zheng","year":"2025","unstructured":"Zheng, W., Liu, C., Deng, P., Chen, X., Wu, X.: Enhancing concurrency vulnerability detection through AST-based static fuzz mutation. J. Syst. Softw. 222, 112352\u2013112352 (2025)","journal-title":"J. Syst. Softw."},{"issue":"2","key":"5637_CR62","doi-asserted-by":"crossref","first-page":"869","DOI":"10.1007\/s11071-019-04828-7","volume":"96","author":"L Zhou","year":"2019","unstructured":"Zhou, L., Tan, F.: A chaotic secure communication scheme based on synchronization of double-layered and multiple complex networks. Nonlinear Dyn. 96(2), 869\u2013883 (2019)","journal-title":"Nonlinear Dyn."},{"key":"5637_CR63","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1016\/j.neucom.2019.05.077","volume":"359","author":"L Zhou","year":"2019","unstructured":"Zhou, L., Tan, F., Yu, F., Liu, W.: Cluster synchronization of two-layer nonlinearly coupled multiplex networks with multi-links and time-delays. Neurocomputing 359, 264\u2013275 (2019)","journal-title":"Neurocomputing"},{"key":"5637_CR64","doi-asserted-by":"crossref","unstructured":"Zhou, L.L., Tan, F., Yu, F.: A robust synchronization based chaotic secure communication scheme with double layered and multiple hybrid networks. IEEE Systems Journal, (2019)","DOI":"10.1109\/JSYST.2019.2927495"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05637-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05637-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05637-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T19:07:23Z","timestamp":1757963243000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05637-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,19]]},"references-count":64,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["5637"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05637-x","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,8,19]]},"assertion":[{"value":"14 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no financial or other conflicts of interests to declare.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"545"}}