{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T04:31:23Z","timestamp":1724560283697},"reference-count":72,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T00:00:00Z","timestamp":1487203200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s11042-017-4395-5","type":"journal-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T04:18:31Z","timestamp":1487218711000},"page":"26941-26963","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A data-aware confidential tunnel for wireless sensor media networks"],"prefix":"10.1007","volume":"78","author":[{"given":"Charles Z.","family":"Liu","sequence":"first","affiliation":[]},{"given":"Manolya","family":"Kavakli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,16]]},"reference":[{"issue":"1","key":"4395_CR1","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/S0375-9601(98)00086-3","volume":"240","author":"M Baptista","year":"1998","unstructured":"Baptista M (1998) Cryptography with chaos. Phys Lett A 240(1):50\u201354","journal-title":"Phys Lett A"},{"issue":"2","key":"4395_CR2","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1016\/j.chaos.2006.05.011","volume":"35","author":"S Behnia","year":"2008","unstructured":"Behnia S, Akhshani A, Mahmodi H, Akhavan A (2008) A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons Fractals 35 (2):408\u2013419","journal-title":"Chaos, Solitons Fractals"},{"key":"4395_CR3","doi-asserted-by":"crossref","unstructured":"Bellare M, Miner SK (1999) A forward-secure digital signature scheme. In: Advances in cryptologycrypto? 9. Springer, pp 431\u2013448","DOI":"10.1007\/3-540-48405-1_28"},{"key":"4395_CR4","doi-asserted-by":"crossref","unstructured":"Bilge L, Strufe T, Balzarotti D, Kirda E (2009) All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of the 18th international conference on world wide web. ACM, pp 551\u2013560","DOI":"10.1145\/1526709.1526784"},{"key":"4395_CR5","doi-asserted-by":"crossref","unstructured":"Brownfield M, Gupta Y, Davis N (2005) Wireless sensor network denial of sleep attack. In: Proceedings from the sixth annual IEEE SMC information assurance workshop. IEEE, pp 356\u2013364","DOI":"10.1109\/IAW.2005.1495974"},{"key":"4395_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.geomorph.2016.06.018","volume":"270","author":"M Bryson","year":"2016","unstructured":"Bryson M, Duce S, Harris D, Webster JM, Thompson A, Vila-Concejo A, Williams SB (2016) Geomorphic changes of a coral shingle cay measured using kite aerial photography. Geomorphology 270:1\u20138","journal-title":"Geomorphology"},{"key":"4395_CR7","unstructured":"Cafarelli DA, Anderson JP Method and apparatus for capture, analysis and display of packet information sent in an ieee 802.11 wireless network, Feb. 24 2004. US Patent 6,697,337"},{"key":"4395_CR8","unstructured":"Carman DW, Kruus PS, Matt BJ (2000) Constraints and approaches for distributed sensor network security (final). DARPA project report, (cryptographic technologies group, trusted information system, NAI labs), 1(1)"},{"key":"4395_CR9","unstructured":"Cho N, Song S-J, Kim S, Kim S, Yoo H-J (2005) A 5.1- \u03bcw uhf rfid tag chip integrated with sensors for wireless environmental monitoring. In: Proceedings of the 31st European solid-state circuits conference, 2005. ESSCIRC 2005. IEEE, pp 279\u2013282"},{"issue":"01","key":"4395_CR10","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1142\/S0218126693000071","volume":"3","author":"LO Chua","year":"1993","unstructured":"Chua LO, Itoh M, Kocarev L, Eckert K (1993) Chaos synchronization in chua\u2019s circuit. Journal of Circuits, Systems, and Computers 3(01):93\u2013108","journal-title":"Journal of Circuits, Systems, and Computers"},{"issue":"2","key":"4395_CR11","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1147\/rd.402.0253","volume":"40","author":"D Coppersmith","year":"1996","unstructured":"Coppersmith D, Johnson DB, Matyas SM (1996) A proposed mode for triple-des encryption. IBM J Res Dev 40(2):253\u2013262","journal-title":"IBM J Res Dev"},{"issue":"2","key":"4395_CR12","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao AC (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198\u2013208","journal-title":"IEEE Trans Inf Theory"},{"key":"4395_CR13","doi-asserted-by":"crossref","unstructured":"Douceur JR (2002) The sybil attack. In: International workshop on peer-to-peer systems. Springer, pp 251\u2013260","DOI":"10.1007\/3-540-45748-8_24"},{"key":"4395_CR14","unstructured":"ElGamal T (1984) A public key cryptosystem and a signature scheme based on discrete logarithms. In: Advances in cryptology. Springer, pp 10\u201318"},{"issue":"1","key":"4395_CR15","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/S0960-0779(02)00585-4","volume":"18","author":"M Feki","year":"2003","unstructured":"Feki M (2003) An adaptive chaos synchronization scheme applied to secure communication. Chaos, Solitons Fractals 18(1):141\u2013148","journal-title":"Chaos, Solitons Fractals"},{"issue":"4","key":"4395_CR16","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/98.403454","volume":"2","author":"Y Frankel","year":"1995","unstructured":"Frankel Y, Herzberg A, Karger PA, Krawczyk H, Kunzinger CA, Yung M (1995) Security issues in a cdpd wireless network. IEEE Pers Commun 2(4):16\u201327","journal-title":"IEEE Pers Commun"},{"key":"4395_CR17","doi-asserted-by":"crossref","unstructured":"Galbally J, Fierrez J, Ortega-Garcia J (2007) Bayesian hill-climbing attack and its application to signature verification. International conference on biometrics. Springer, pp 386\u2013395","DOI":"10.1007\/978-3-540-74549-5_41"},{"key":"4395_CR18","doi-asserted-by":"crossref","unstructured":"Haber S, Stornetta WS (1990) How to time-stamp a digital document. Springer","DOI":"10.1007\/BF00196791"},{"key":"4395_CR19","doi-asserted-by":"crossref","unstructured":"Habutsu T, Nishio Y, Sasase I, Mori S (1991) A secret key cryptosystem by iterating a chaotic map. In: Advances in cryptologyEUROCRYPT91. Springer, pp 127\u2013140","DOI":"10.1007\/3-540-46416-6_11"},{"key":"4395_CR20","doi-asserted-by":"crossref","unstructured":"Haque MM, Pathan A-SK, Choi BG, Hong CS (2007) An efficient pkc-based security architecture for wireless sensor networks. In: Military communications conference, 2007. MILCOM 2007. IEEE. IEEE, pp 1\u20137","DOI":"10.1109\/MILCOM.2007.4455317"},{"issue":"5","key":"4395_CR21","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MCOM.2002.1006971","volume":"40","author":"ME Hellman","year":"2002","unstructured":"Hellman ME (2002) An overview of public key cryptography. IEEE Commun Mag 40(5):42\u201349","journal-title":"IEEE Commun Mag"},{"key":"4395_CR22","unstructured":"Holdridge LR, Grenke WC et al (1971) Forest environments in tropical life zones: a pilot study, Pergamon Press, Oxford, New York"},{"key":"4395_CR23","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.ins.2011.03.014","volume":"231","author":"J-Y Huang","year":"2013","unstructured":"Huang J-Y, Liao I-E, Chung Y-F, Chen K-T (2013) Shielding wireless sensor network using markovian intrusion detection system with attack pattern mining. Inf Sci 231:32\u201344","journal-title":"Inf Sci"},{"key":"4395_CR24","doi-asserted-by":"crossref","unstructured":"Hunt R (2001) Pki and digital certification infrastructure. In: Ninth IEEE international conference on Networks, 2001. Proceedings. IEEE, pp 234\u2013239","DOI":"10.1109\/ICON.2001.962346"},{"key":"4395_CR25","doi-asserted-by":"crossref","unstructured":"Irani D, Balduzzi M, Balzarotti D, Kirda E, Pu C (2011) Reverse social engineering attacks in online social networks. In: International conference on detection of intrusions and malware, and vulnerability assessment. Springer, pp 55\u201374","DOI":"10.1007\/978-3-642-22424-9_4"},{"issue":"10","key":"4395_CR26","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"TN Jagatic","year":"2007","unstructured":"Jagatic TN, Johnson NA, Jakobsson M, Menczer F (2007) Social phishing. Commun ACM 50(10):94\u2013100","journal-title":"Commun ACM"},{"issue":"6","key":"4395_CR27","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/S0375-9601(01)00771-X","volume":"291","author":"G Jakimoski","year":"2001","unstructured":"Jakimoski G, Kocarev L (2001) Analysis of some recently proposed chaos-based encryption algorithms. Phys Lett A 291(6):381\u2013384","journal-title":"Phys Lett A"},{"issue":"2","key":"4395_CR28","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/81.904880","volume":"48","author":"G Jakimoski","year":"2001","unstructured":"Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans Circuits Syst I, Fundam Theory Appl 48 (2):163\u2013169","journal-title":"IEEE Trans Circuits Syst I, Fundam Theory Appl"},{"issue":"5","key":"4395_CR29","doi-asserted-by":"publisher","first-page":"2557","DOI":"10.1016\/j.chaos.2007.10.049","volume":"40","author":"A Kanso","year":"2009","unstructured":"Kanso A, Smaoui N (2009) Logistic chaotic maps for binary numbers generations. Chaos, Solitons Fractals 40(5):2557\u20132568","journal-title":"Chaos, Solitons Fractals"},{"key":"4395_CR30","doi-asserted-by":"crossref","unstructured":"Kean T, Duncan A (1998) Des key breaking, encryption and decryption on the xc6216. In: Fccm. IEEE, p 310","DOI":"10.1109\/FPGA.1998.707930"},{"issue":"3","key":"4395_CR31","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/7384.963463","volume":"1","author":"L Kocarev","year":"2001","unstructured":"Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circuits Syst Mag 1(3):6\u201321","journal-title":"IEEE Circuits Syst Mag"},{"key":"4395_CR32","unstructured":"Lo BP, Thiemjarus S, King R, Yang G-Z (2005) Body sensor network\u2013a wireless sensor platform for pervasive healthcare monitoring, 77\u201380"},{"issue":"11","key":"4395_CR33","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1109\/LCOMM.2007.071154","volume":"11","author":"H Ma","year":"2007","unstructured":"Ma H, Zhu J, Roy S (2007) On loss differentiation for csma-based dense wireless network. IEEE Commun Lett 11(11):877\u2013879","journal-title":"IEEE Commun Lett"},{"key":"4395_CR34","doi-asserted-by":"crossref","unstructured":"Mainwaring A, Culler D, Polastre J, Szewczyk R, Anderson J (2002) Wireless sensor networks for habitat monitoring. In: Proceedings of the 1st ACM international workshop on wireless sensor networks and applications. ACM, pp 88\u201397","DOI":"10.1145\/570738.570751"},{"issue":"3","key":"4395_CR35","doi-asserted-by":"publisher","first-page":"1689","DOI":"10.1007\/s10661-013-3486-7","volume":"186","author":"V Marshall","year":"2014","unstructured":"Marshall V, Lewis M, Ostendorf B (2014) Detecting new buffel grass infestations in Australian arid lands: evaluation of methods using high-resolution multispectral imagery and aerial photography. Environ Monit Assess 186(3):1689\u20131703","journal-title":"Environ Monit Assess"},{"key":"4395_CR36","doi-asserted-by":"crossref","unstructured":"Martinez-Diaz M, Fierrez-Aguilar J, Alonso-Fernandez F, Ortega-Garc\u00eda J, Siguenza J (2006) Hill-climbing and brute-force attacks on biometric systems: a case study in match-on-card fingerprint verification. In: Proceedings 40th annual 2006 international carnahan conference on security technology. IEEE, pp 151\u2013159","DOI":"10.1109\/CCST.2006.313444"},{"issue":"2","key":"4395_CR37","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"Mirkovic J, Reiher P (2004) A taxonomy of ddos attack and ddos defense mechanisms. ACM SIGCOMM Computer Communication Review 34(2):39\u201353","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"3","key":"4395_CR38","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/S0375-9601(98)00868-8","volume":"251","author":"\u00d6 Morg\u00fcl","year":"1999","unstructured":"Morg\u00fcl \u00d6, Feki M (1999) A chaotic masking scheme by using synchronized chaotic systems. Phys Lett A 251(3):169\u2013176","journal-title":"Phys Lett A"},{"issue":"05","key":"4395_CR39","doi-asserted-by":"publisher","first-page":"1567","DOI":"10.1142\/S0218127410027076","volume":"20","author":"B Muthuswamy","year":"2010","unstructured":"Muthuswamy B, Chua LO (2010) Simplest chaotic circuit. Int J Bifurcation Chaos 20(05):1567\u20131580","journal-title":"Int J Bifurcation Chaos"},{"key":"4395_CR40","doi-asserted-by":"crossref","unstructured":"Newsome J, Shi E, Song D, Perrig A (2004) The sybil attack in sensor networks: analysis & defenses. In: Proceedings of the 3rd international symposium on information processing in sensor networks. ACM, pp 259\u2013268","DOI":"10.1145\/984622.984660"},{"key":"4395_CR41","volume-title":"Wireless security","author":"RK Nichols","year":"2002","unstructured":"Nichols RK, Lekkas PC (2002) Wireless security. McGraw-Hill, New York"},{"key":"4395_CR42","unstructured":"Oh H-W, Jang J-H, Park K-R (2009) A zigbee and zigbee-to-ir device control scheme for single media multi devices. In: Proceedings of IEEE 13th international symposium on consumer electronics. IEEE, pp 365\u2013369"},{"issue":"9","key":"4395_CR43","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"NK Pareek","year":"2006","unstructured":"Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926\u2013934","journal-title":"Image Vis Comput"},{"key":"4395_CR44","unstructured":"Pawar P, Nielsen R, Prasad N, Ohmori S et al (2011) Hybrid mechanisms: towards an efficient wireless sensor network medium access control. In: Proceedings of the 14th international symposium on wireless personal multimedia communications (WPMC). IEEE, pp 1\u20135"},{"issue":"6","key":"4395_CR45","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A Perrig","year":"2004","unstructured":"Perrig A, Stankovic J, Wagner D (2004) Security in wireless sensor networks. Commun ACM 47(6):53\u201357","journal-title":"Commun ACM"},{"issue":"10","key":"4395_CR46","doi-asserted-by":"publisher","first-page":"2291","DOI":"10.1142\/S0218127400001481","volume":"10","author":"A Pikovsky","year":"2000","unstructured":"Pikovsky A, Rosenblum M, Kurths J (2000) Phase synchronization in regular and chaotic systems. Int J Bifurcation Chaos 10(10):2291\u20132305","journal-title":"Int J Bifurcation Chaos"},{"key":"4395_CR47","doi-asserted-by":"crossref","unstructured":"Piotrowski K, Langendoerfer P, Peter S (2006) How public key cryptography influences wireless sensor node lifetime. In: Proceedings of the fourth ACM workshop on security of ad hoc and sensor networks. ACM, pp 169\u2013176","DOI":"10.1145\/1180345.1180366"},{"key":"4395_CR48","unstructured":"Qaisar SB, Radha H (2009) Multipath multi-stream distributed reliable video delivery in wireless sensor networks. In: Proceedings of the 43rd annual conference on information sciences and systems. IEEE, pp 207\u2013212"},{"key":"4395_CR49","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.optcom.2013.06.036","volume":"309","author":"SK Rajput","year":"2013","unstructured":"Rajput SK, Nishchal NK (2013) Known-plaintext attack on encryption domain independent optical asymmetric cryptosystem. Opt Commun 309:231\u2013235","journal-title":"Opt Commun"},{"key":"4395_CR50","doi-asserted-by":"crossref","unstructured":"Rayanchu S, Mishra A, Agrawal D, Saha S, Banerjee S (2008) Diagnosing wireless packet losses in 802.11: separating collision from weak signal. In: INFOCOM 2008. The 27th conference on computer communications. IEEE. IEEE","DOI":"10.1109\/INFOCOM.2008.124"},{"issue":"2","key":"4395_CR51","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120\u2013126","journal-title":"Commun ACM"},{"key":"4395_CR52","doi-asserted-by":"crossref","unstructured":"Sharma P, Sharma N, Singh R (2012) A secure intrusion detection system against ddos attack in wireless mobile ad-hoc network. Int J Comput Appl 41(21)","DOI":"10.5120\/5824-8064"},{"key":"4395_CR53","unstructured":"Soutar C (2002) Biometric system security. White paper, bioscrypt, \n                    http:\/\/www.bioscrypt.com"},{"issue":"1","key":"4395_CR54","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/S0375-9601(00)00026-8","volume":"266","author":"JC Sprott","year":"2000","unstructured":"Sprott JC (2000) A new class of chaotic circuit. Phys Lett A 266(1):19\u201323","journal-title":"Phys Lett A"},{"issue":"3","key":"4395_CR55","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1080\/0161-110291890876","volume":"26","author":"W Stallings","year":"2002","unstructured":"Stallings W (2002) The advanced encryption standard. Cryptologia 26(3):165\u2013188","journal-title":"Cryptologia"},{"key":"4395_CR56","unstructured":"Stallings W, Brown L (2008) Computer security. Principles and Practice"},{"key":"4395_CR57","doi-asserted-by":"crossref","unstructured":"Steiner M, Tsudik G, Waidner M (1996) Diffie-hellman key distribution extended to group communication. In: Proceedings of the 3rd ACM conference on computer and communications security. ACM, pp 31\u201337","DOI":"10.1145\/238168.238182"},{"issue":"2","key":"4395_CR58","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.cageo.2004.09.015","volume":"31","author":"JC Su\u00e1rez","year":"2005","unstructured":"Su\u00e1rez JC, Ontiveros C, Smith S, Snape S (2005) Use of airborne lidar and aerial photography in the estimation of individual tree heights in forestry. Comput Geosci 31(2):253\u2013262","journal-title":"Comput Geosci"},{"key":"4395_CR59","doi-asserted-by":"crossref","unstructured":"Uludag U, Jain AK (2004) Attacks on biometric systems: a case study in fingerprints. In: Electronic imaging 2004. International Society for Optics and Photonics, pp 622\u2013633","DOI":"10.1117\/12.530907"},{"key":"4395_CR60","doi-asserted-by":"crossref","unstructured":"Vogels M, de Jong S, Sterk G, Addink E (2017) Agricultural cropland mapping using black-and-white aerial photography, object-based image analysis and random forests. Int J Appl Earth Obs Geoinf 54:114\u2013123","DOI":"10.1016\/j.jag.2016.09.003"},{"issue":"1","key":"4395_CR61","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","volume":"11","author":"Y Wang","year":"2011","unstructured":"Wang Y, Wong K-W, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514\u2013522","journal-title":"Appl Soft Comput"},{"key":"4395_CR62","doi-asserted-by":"crossref","unstructured":"Werner-Allen G, Johnson J, Ruiz M, Lees J, Welsh M (2005) Monitoring volcanic eruptions with a wireless sensor network. In: Proceedings of the second european workshop on wireless sensor networks, 2005. IEEE, pp 108\u2013120","DOI":"10.1109\/EWSN.2005.1462003"},{"key":"4395_CR63","doi-asserted-by":"crossref","unstructured":"Xu N, Rangwala S, Chintalapudi KK, Ganesan D, Broad A, Govindan R, Estrin D (2004) A wireless sensor network for structural monitoring. In: Proceedings of the 2nd international conference on embedded networked sensor systems. ACM, pp 13\u201324","DOI":"10.1145\/1031495.1031498"},{"issue":"1","key":"4395_CR64","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/S0375-9601(98)00560-X","volume":"247","author":"T Yang","year":"1998","unstructured":"Yang T, Yang L-B, Yang C-M (1998) Breaking chaotic secure communication using a spectrogram. Phys Lett A 247(1):105\u2013111","journal-title":"Phys Lett A"},{"issue":"1","key":"4395_CR65","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.chaos.2004.03.038","volume":"23","author":"M Yassen","year":"2005","unstructured":"Yassen M (2005) Chaos synchronization between two different chaotic systems using active control. Chaos, Solitons Fractals 23(1):131\u2013140","journal-title":"Chaos, Solitons Fractals"},{"issue":"5","key":"4395_CR66","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1016\/j.patrec.2009.11.008","volume":"31","author":"G Ye","year":"2010","unstructured":"Ye G (2010) Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn Lett 31(5):347\u2013354","journal-title":"Pattern Recogn Lett"},{"issue":"12","key":"4395_CR67","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1016\/j.comnet.2008.04.002","volume":"52","author":"J Yick","year":"2008","unstructured":"Yick J, Mukherjee B, Ghosal D (2008) Wireless sensor network survey. Comput Netw 52(12):2292\u20132330","journal-title":"Comput Netw"},{"issue":"1","key":"4395_CR68","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1109\/TIE.2014.2327558","volume":"62","author":"L Zhang","year":"2015","unstructured":"Zhang L, Gao Y, Xia Y, Dai Q, Li X (2015) A fine-grained image categorization system by cellet-encoded spatial pyramid modeling. IEEE Trans Ind Electron 62(1):564\u2013571","journal-title":"IEEE Trans Ind Electron"},{"issue":"12","key":"4395_CR69","doi-asserted-by":"publisher","first-page":"5071","DOI":"10.1109\/TIP.2013.2278465","volume":"22","author":"L Zhang","year":"2013","unstructured":"Zhang L, Han Y, Yang Y, Song M, Yan S, Tian Q (2013) Discovering discriminative graphlets for aerial image categories recognition. IEEE Trans Image Process 22(12):5071\u20135084","journal-title":"IEEE Trans Image Process"},{"issue":"9","key":"4395_CR70","doi-asserted-by":"publisher","first-page":"4150","DOI":"10.1109\/TIP.2014.2344433","volume":"23","author":"L Zhang","year":"2014","unstructured":"Zhang L, Yang Y, Gao Y, Yu Y, Wang C, Li X (2014) A probabilistic associative model for segmenting weakly supervised images. IEEE Trans Image Process 23(9):4150\u20134159","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"4395_CR71","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1007\/s11071-012-0329-y","volume":"69","author":"Y Zhang","year":"2012","unstructured":"Zhang Y, Li C, Li Q, Zhang D, Shu S (2012) Breaking a chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 69(3):1091\u20131096","journal-title":"Nonlinear Dyn"},{"issue":"9","key":"4395_CR72","doi-asserted-by":"publisher","first-page":"8056","DOI":"10.3390\/rs6098056","volume":"6","author":"A Zlinszky","year":"2014","unstructured":"Zlinszky A, Schroiff A, Kania A, De\u00e1k B., M\u00fccke W., V\u00e1ri \u00c1. , Sz\u00e9kely B., Pfeifer N (2014) Categorizing grassland vegetation with full-waveform airborne laser scanning: a feasibility study for detecting natura 2000 habitat types. Remote Sens 6(9):8056\u20138087","journal-title":"Remote Sens"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4395-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-4395-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4395-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,8]],"date-time":"2020-02-08T22:30:00Z","timestamp":1581201000000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-4395-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,16]]},"references-count":72,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["4395"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-4395-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,2,16]]},"assertion":[{"value":"1 September 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 December 2016","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 January 2017","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2017","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}