{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T16:11:43Z","timestamp":1773677503543,"version":"3.50.1"},"reference-count":101,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,5,26]],"date-time":"2025-05-26T00:00:00Z","timestamp":1748217600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,5,26]],"date-time":"2025-05-26T00:00:00Z","timestamp":1748217600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Process Lett"],"DOI":"10.1007\/s11063-025-11772-8","type":"journal-article","created":{"date-parts":[[2025,5,26]],"date-time":"2025-05-26T09:02:05Z","timestamp":1748250125000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Artificial Complex-Valued Neural Processing Using Memristive Hyperchaotic Synchronization"],"prefix":"10.1007","volume":"57","author":[{"given":"Leiqing","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Arindam","family":"Sarkar","sequence":"additional","affiliation":[]},{"given":"Abdulfattah","family":"Noorwali","sequence":"additional","affiliation":[]},{"given":"Alsharef","family":"Mohammad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,26]]},"reference":[{"key":"11772_CR1","doi-asserted-by":"crossref","unstructured":"Aluvalu R, Kumaran VNS, Thirumalaisamy M, Basheer S, Ali E, Selvarajan S (2023) Efficient data transmission on wireless communication through a privacy-enhanced blockchain process. PeerJ Computer Science, 9","DOI":"10.7717\/peerj-cs.1308"},{"issue":"7","key":"11772_CR2","doi-asserted-by":"publisher","first-page":"73118","DOI":"10.1063\/5.0209779","volume":"34","author":"X An","year":"2024","unstructured":"An X, Du L, Jiang F, Zhang Y, Deng Z, Kurths J (2024) A few-shot identification method for stochastic dynamical systems based on residual multipeaks adaptive sampling. Chaos: An Interdisciplinary Journal of Nonlinear Science 34(7):73118\u201373118","journal-title":"Chaos: An Interdisciplinary Journal of Nonlinear Science"},{"key":"11772_CR3","doi-asserted-by":"crossref","unstructured":"Cai Q, Chen J, Luo D, Sun G, Yu H, Guizani M (2024) Deter-Pay: A Deterministic Routing Protocol in Concurrent Payment Channel Network. IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2024.3416086"},{"issue":"7","key":"11772_CR4","doi-asserted-by":"publisher","first-page":"170306","DOI":"10.1007\/s11432-023-4011-4","volume":"67","author":"B Cao","year":"2024","unstructured":"Cao B, Zhao J, Liu X, Li Y (2024) Adaptive 5G-and-beyond network-enabled interpretable federated learning enhanced by neuroevolution. Science China Information Sciences 67(7):170306\u2013170306","journal-title":"Science China Information Sciences"},{"issue":"8","key":"11772_CR5","doi-asserted-by":"publisher","first-page":"4596","DOI":"10.1109\/TED.2024.3418727","volume":"71","author":"D Chen","year":"2024","unstructured":"Chen D, Wang Y, Song Y, Zhang W (2024) TCAD Analysis of Single-Event Burnout Hardness for an Improved CoolSiC Trench MOSFET. IEEE Transactions on Electron Devices 71(8):4596\u20134603","journal-title":"IEEE Transactions on Electron Devices"},{"issue":"11","key":"11772_CR6","doi-asserted-by":"publisher","first-page":"3246","DOI":"10.1109\/TNNLS.2018.2890269","volume":"30","author":"Huabin Chen","year":"2019","unstructured":"Chen Huabin, Shi Peng, Lim Cheng-Chew (2019) Cluster Synchronization for Neutral Stochastic Delay Networks via Intermittent Adaptive Control. IEEE Transactions on Neural Networks and Learning Systems 30(11):3246\u20133259","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"11772_CR7","doi-asserted-by":"crossref","unstructured":"Chen Z et al (2023) An overview of in vitro biological neural networks for robot intelligence","DOI":"10.34133\/cbsystems.0001"},{"key":"11772_CR8","doi-asserted-by":"crossref","unstructured":"Chen J, Wang J, Wang J, Bai L (2024) Joint Fairness and Efficiency Optimization for CSMA\/CA-Based Multi-User MIMO UAV Ad Hoc Networks. IEEE Journal of Selected Topics in Signal Processing, pages 1\u201313","DOI":"10.1109\/JSTSP.2024.3435348"},{"key":"11772_CR9","doi-asserted-by":"crossref","unstructured":"Chen Y et al (2024) Towards human-like walking with biomechanical and neuromuscular control features: personalized attachment point optimization method of cable-driven exoskeleton","DOI":"10.3389\/fnagi.2024.1327397"},{"key":"11772_CR10","doi-asserted-by":"crossref","unstructured":"Ding J et al (2023) DialogueINAB: an interaction neural network based on attitudes and behaviors of interlocutors for dialogue emotion recognition","DOI":"10.1007\/s11227-023-05439-1"},{"key":"11772_CR11","doi-asserted-by":"crossref","unstructured":"Ding F et al (2024) Adaptive memory event-triggered output feedback finite-time lane-keeping control for autonomous heavy truck with roll prevention","DOI":"10.1109\/TFUZZ.2024.3454344"},{"key":"11772_CR12","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/978-3-319-24369-6_37","volume":"9339","author":"M Dolecki","year":"2015","unstructured":"Dolecki M, Kozera R (2015) The Impact of the TPM Weights Distribution on Network Synchronization Time. ComputerInformation Systems and Industrial Management 9339:451\u2013460","journal-title":"ComputerInformation Systems and Industrial Management"},{"issue":"11","key":"11772_CR13","doi-asserted-by":"publisher","first-page":"4999","DOI":"10.1109\/TNNLS.2019.2955165","volume":"31","author":"T Dong","year":"2020","unstructured":"Dong T, Huang T (2020) Neural Cryptography Based on Complex-Valued Neural Network. IEEE Transactions on Neural Networks and Learning Systems 31(11):4999\u20135004","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"issue":"2","key":"11772_CR14","doi-asserted-by":"publisher","first-page":"909","DOI":"10.32604\/cmes.2022.021713","volume":"134","author":"P El-Kafrawy","year":"2023","unstructured":"El-Kafrawy P, Aboghazalah M, Ahmed AM, Torkey H, El-Sayed A (2023) An Efficient Encryption and Compression of Sensed IoT Medical Images Using Auto-Encoder. CMES-Computer Modeling in Engineering & Sciences 134(2):909\u2013926","journal-title":"CMES-Computer Modeling in Engineering & Sciences"},{"key":"11772_CR15","doi-asserted-by":"publisher","first-page":"20843","DOI":"10.1038\/s41598-023-46746-0","volume":"13","author":"V Ellappan","year":"2023","unstructured":"Ellappan V, Mahendran A, Subramanian M (2023) Sliding principal component and dynamic reward reinforcement learning based IIoT attack detection. Sci Rep 13:20843\u201320843","journal-title":"Sci Rep"},{"key":"11772_CR16","doi-asserted-by":"crossref","unstructured":"Fang H, Ma S, Wang J, Zhao L, Nie F, Ma X, Zheng L (2024) Multimodal In-Sensor Computing Implemented by Easily-Fabricated Oxide-Heterojunction Optoelectronic Synapses. Advanced Functional Materials, pages 2409045\u20132409045","DOI":"10.1002\/adfm.202409045"},{"key":"11772_CR17","doi-asserted-by":"crossref","unstructured":"Franois M, Grosges T, Barchiesi D (2014) Pseudo-random number generator based on mixing of three chaotic maps. 19(4):887\u2013895","DOI":"10.1016\/j.cnsns.2013.08.032"},{"key":"11772_CR18","doi-asserted-by":"crossref","unstructured":"Fu Y, Dong M, Zhou L, Li C, Yu FR, Cheng N (2024) A Distributed Incentive Mechanism to Balance Demand and Communication Overhead for Multiple Federated Learning Tasks in IoV. IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2024.3510561"},{"issue":"7","key":"11772_CR19","doi-asserted-by":"publisher","first-page":"253","DOI":"10.23919\/JCC.2021.07.020","volume":"18","author":"N Gao","year":"2021","unstructured":"Gao N, Zeng Y, Wang J, Wu D, Zhang C, Song Q, Jin S (2021) Energy model for UAV communications: Experimental validation and model generalization. China Communications 18(7):253\u2013264","journal-title":"China Communications"},{"key":"11772_CR20","doi-asserted-by":"crossref","unstructured":"Garc\u00eda-Guerrero EE, Inzunza-Gonz\u00e1lez E, L\u00f3pez-Bonilla OR, C\u00e1rdenas-Valdez JR, Tlelo-Cuautle E (2020) Randomness improvement of chaotic maps for image encryption in a wireless communication scheme using PIC-microcontroller via Zigbee channels. Chaos, Solitons & Fractals, 133","DOI":"10.1016\/j.chaos.2020.109646"},{"key":"11772_CR21","doi-asserted-by":"crossref","unstructured":"Gong Y et al (2024) Computation and privacy protection for satellite-ground digital twin networks","DOI":"10.1109\/TCOMM.2024.3392795"},{"issue":"4","key":"11772_CR22","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/MNET.2024.3413543","volume":"38","author":"Y Gong","year":"2024","unstructured":"Gong Y, Yao H, Nallanathan A (2024) Intelligent sensing, communication, computation and caching for satellite-ground integrated networks. IEEE Network 38(4):9\u201316","journal-title":"IEEE Network"},{"key":"11772_CR23","doi-asserted-by":"crossref","unstructured":"Gong Y, Yao H, Xiong Z, Chen CP, Niyato D (2024) Blockchain-Aided Digital Twin Offloading Mechanism in Space-Air-Ground Networks. IEEE Transactions on Mobile Computing","DOI":"10.1109\/TMC.2024.3455417"},{"issue":"3","key":"11772_CR24","doi-asserted-by":"publisher","first-page":"3382","DOI":"10.1007\/s11227-023-05592-7","volume":"80","author":"X Gu","year":"2024","unstructured":"Gu X, Chen X, Lu P, Lan X, Li X, Du Y (2024) SiMaLSTM-SNP: novel semantic relatedness learning model preserving both Siamese networks and membrane computing. The Journal of Supercomputing 80(3):3382\u20133411","journal-title":"The Journal of Supercomputing"},{"key":"11772_CR25","doi-asserted-by":"crossref","unstructured":"Hao S et al (2023a) Group identity modulates bidding behavior in repeated lottery contest: neural signatures from event-related potentials and electroencephalography oscillations","DOI":"10.3389\/fnins.2023.1184601"},{"key":"11772_CR26","doi-asserted-by":"crossref","unstructured":"Hao S et al (2023b) Group membership modulates the hold-up problem: an event-related potentials and oscillations study","DOI":"10.1093\/scan\/nsad071"},{"key":"11772_CR27","doi-asserted-by":"crossref","unstructured":"Jeong Sooyong, Park Cheolhee, Hong Dowon, Seo Changho, Jho Namsu (2021) Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems. Security and Communication Networks, 2021","DOI":"10.1155\/2021\/6680782"},{"key":"11772_CR28","doi-asserted-by":"crossref","unstructured":"Jiang F, Li T, Lv X, Rui H, Jin D (2024) Physics-Informed Neural Networks for Path Loss Estimation by Solving Electromagnetic Integral Equations. IEEE Transactions on Wireless Communications","DOI":"10.1109\/TWC.2024.3429196"},{"key":"11772_CR29","doi-asserted-by":"publisher","first-page":"111358","DOI":"10.1016\/j.knosys.2023.111358","volume":"285","author":"S Jin","year":"2024","unstructured":"Jin S, Wang X, Meng Q (2024) Spatial memory-augmented visual navigation based on hierarchical deep reinforcement learning in unknown environments. Knowledge-Based Systems 285:111358\u2013111358","journal-title":"Knowledge-Based Systems"},{"key":"11772_CR30","doi-asserted-by":"publisher","first-page":"1247","DOI":"10.1007\/s10207-022-00609-3","volume":"21","author":"A Kifouche","year":"2022","unstructured":"Kifouche A, Azzaz MS, Hamouche R (2022) Design and implementation of a new lightweight chaos-based cryptosystem to secure IoT communications. Int. J. Inf. Secur 21:1247\u20131262","journal-title":"Int. J. Inf. Secur"},{"issue":"11","key":"11772_CR31","doi-asserted-by":"publisher","first-page":"12935","DOI":"10.1109\/TII.2024.3431020","volume":"20","author":"C Li","year":"2024","unstructured":"Li C, He A, Liu G, Wen Y, Chronopoulos AT, Giannakos A (2024) RFL-APIA: A Comprehensive Framework for Mitigating Poisoning Attacks and Promoting Model Aggregation in IIoT Federated Learning. IEEE Transactions on Industrial Informatics 20(11):12935\u201312944","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"9","key":"11772_CR32","doi-asserted-by":"publisher","first-page":"8777","DOI":"10.1109\/TIE.2020.3013537","volume":"68","author":"M Li","year":"2021","unstructured":"Li M, Wang T, Chu F, Han Q, Qin Z, Zuo MJ (2021) Scaling-Basis Chirplet Transform. IEEE Transactions on Industrial Electronics 68(9):8777\u20138788","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"11772_CR33","unstructured":"Li Q, Yang Y, Wen Y, Zhang G, Xing W (2024) Active Gate Driver With the Independent Suppression of Overshoot and Oscillation for SiC MOSFET Modules. IEEE Transactions on Industrial Electronics, pages 1\u201311"},{"issue":"8","key":"11772_CR34","doi-asserted-by":"publisher","first-page":"2624","DOI":"10.1109\/TMC.2020.2984364","volume":"20","author":"T Li","year":"2021","unstructured":"Li T, Braud T, Li Y, Hui P (2021) Lifecycle-Aware Online Video Caching. IEEE Transactions on Mobile Computing 20(8):2624\u20132636","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"11772_CR35","doi-asserted-by":"crossref","unstructured":"Li T, Kouyoumdjieva ST, Karlsson G, Hui P (2019) Data collection and node counting by opportunistic communication. In and others, editor, 2019 IFIP Networking Conference (IFIP Networking)","DOI":"10.23919\/IFIPNetworking46909.2019.8999476"},{"issue":"4","key":"11772_CR36","first-page":"1481","volume":"10","author":"T Li","year":"2016","unstructured":"Li T, Xiao Z, Georges H, Luo Z, Wang D (2016) Performance Analysis of Co- and Cross-tier Device-to-Device Communication Underlaying Macro-small Cell Wireless Networks. KSII Transactions on Internet and Information Systems 10(4):1481\u20131500","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"11772_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIM.2024.3493878","volume":"73","author":"X Li","year":"2024","unstructured":"Li X, Lu Z, Yuan M, Liu W, Wang F, Yu Y, Liu P (2024) Tradeoff of Code Estimation Error Rate and Terminal Gain in SCER Attack. IEEE Transactions on Instrumentation and Measurement 73:1\u201312","journal-title":"IEEE Transactions on Instrumentation and Measurement"},{"issue":"9","key":"11772_CR38","doi-asserted-by":"publisher","first-page":"8701","DOI":"10.1007\/s11071-023-08291-3","volume":"111","author":"Y Li","year":"2023","unstructured":"Li Y, Kai Y (2023) Wave structures and the chaotic behaviors of the cubic-quartic nonlinear Schr\u00f6dinger equation for parabolic law in birefringent fibers. Nonlinear Dynamics 111(9):8701\u20138712","journal-title":"Nonlinear Dynamics"},{"issue":"8","key":"11772_CR39","doi-asserted-by":"publisher","first-page":"2358","DOI":"10.1109\/TNNLS.2018.2884620","volume":"30","author":"P Liu","year":"2019","unstructured":"Liu P, Zeng Z, Wang J (2019) Global synchronization of coupled fractional-order recurrent neural networks. IEEE Transactions on Neural Networks and Learning Systems 30(8):2358\u20132368","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"11772_CR40","doi-asserted-by":"crossref","unstructured":"Liu Y, Li W, Dong X, Ren Z (2024) Resilient Formation Tracking for Networked Swarm Systems Under Malicious Data Deception Attacks. International Journal of Robust and Nonlinear Control","DOI":"10.1002\/rnc.7777"},{"key":"11772_CR41","doi-asserted-by":"publisher","first-page":"106461","DOI":"10.1016\/j.neunet.2024.106461","volume":"178","author":"Z Liu","year":"2024","unstructured":"Liu Z, Xiong X, Li Y, Yu Y, Lu J, Zhang S, Xiong F (2024) HyGloadAttack: Hard-label black-box textual adversarial attacks via hybrid optimization. Neural Networks 178:106461\u2013106461","journal-title":"Neural Networks"},{"key":"11772_CR42","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1016\/j.neunet.2023.08.044","volume":"167","author":"R Luo","year":"2023","unstructured":"Luo R, Peng Z, Hu J, Ghosh BK (2023) Adaptive optimal control of affine nonlinear systems via identifier-critic neural network approximation with relaxed PE conditions. Neural Networks 167:588\u2013600","journal-title":"Neural Networks"},{"key":"11772_CR43","doi-asserted-by":"crossref","unstructured":"Ma Songsong, Chen Yuansheng, Yang Songlin, Liu Shen, Tang Lingqi, Li Bing, Li Yao (2023) The Autonomous Pipeline Navigation of a Cockroach Bio-Robot with Enhanced Walking Stimuli. Cyborg Bionic Syst","DOI":"10.34133\/cbsystems.0067"},{"key":"11772_CR44","doi-asserted-by":"crossref","unstructured":"Manoharan Hariprasath (2023) Implementation of Internet of Things With Blockchain Using Machine Learning Algorithm: Enhancement of Security With Blockchain. In Najar Tharwa et\u00a0al., (eds), Handbook of Research on Blockchain Technology and the Digitalization of the Supply Chain, pages 399\u2013430. IGI Global","DOI":"10.4018\/978-1-6684-7455-6.ch019"},{"key":"11772_CR45","doi-asserted-by":"crossref","unstructured":"Meng Q et al (2023) Adaptive fixed-time stabilization for a class of uncertain nonlinear systems","DOI":"10.1109\/TAC.2023.3244151"},{"key":"11772_CR46","doi-asserted-by":"publisher","first-page":"10615","DOI":"10.1007\/s11042-020-10032-2","volume":"80","author":"M Nazari","year":"2021","unstructured":"Nazari M, Mehrabian M (2021) A novel chaotic IWT-LSB blind watermarking approach with flexible capacity for secure transmission of authenticated medical images. Multimed Tools Appl 80:10615\u201310655","journal-title":"Multimed Tools Appl"},{"key":"11772_CR47","doi-asserted-by":"crossref","unstructured":"Nie F et al (2025) An adaptive solid-state synapse with bi-directional relaxation for multimodal recognition and spatio-temporal learning","DOI":"10.1002\/adma.202412006"},{"key":"11772_CR48","doi-asserted-by":"crossref","unstructured":"Peng X et al (2024) Task offloading for IoAV under extreme weather conditions using dynamic price driven double broad reinforcement learning","DOI":"10.1109\/JIOT.2024.3360110"},{"key":"11772_CR49","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s10207-023-00748-1","volume":"23","author":"OBJ Rabie","year":"2024","unstructured":"Rabie OBJ, Selvarajan S, Hasanin T (2024) A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs). Int. J. Inf. Secur 23:51\u201380","journal-title":"Int. J. Inf. Secur"},{"key":"11772_CR50","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1038\/s41598-024-51154-z","volume":"14","author":"OBJ Rabie","year":"2024","unstructured":"Rabie OBJ, Selvarajan S, Hasanin T (2024) A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models. Sci Rep 14:386\u2013386","journal-title":"Sci Rep"},{"key":"11772_CR51","doi-asserted-by":"crossref","unstructured":"Ramasamy Jayaraj, Ravikumar RN, Shitharth S (2023) Artificial Neural Networks for Data Processing: A Case Study of Image Classification. In and others, editor, Advanced Mathematical Applications in Data Science, pages 116\u2013127. Bentham Books","DOI":"10.2174\/9789815124842123010011"},{"issue":"12","key":"11772_CR52","doi-asserted-by":"publisher","first-page":"414","DOI":"10.3390\/electronics7120414","volume":"7","author":"E Rodr\u00edguez-Orozco","year":"2018","unstructured":"Rodr\u00edguez-Orozco E, Garc\u00eda-Guerrero EE, Inzunza-Gonzalez E, L\u00f3pez-Bonilla OR, Flores-Vergara A, C\u00e1rdenas-Valdez JR, Tlelo-Cuautle E (2018) FPGA-based Chaotic Cryptosystem by Using Voice Recognition as Access Key. Electronics 7(12):414\u2013414","journal-title":"Electronics"},{"key":"11772_CR53","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1007\/s11071-018-4390-z","volume":"94","author":"ML Sahari","year":"2018","unstructured":"Sahari ML, Boukemara I (2018) A pseudo-random numbers generator based on a novel 3D chaotic map with an application to color image encryption. Nonlinear Dyn 94:723\u2013744","journal-title":"Nonlinear Dyn"},{"key":"11772_CR54","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1007\/s11063-021-10443-8","volume":"53","author":"A Sarkar","year":"2021","unstructured":"Sarkar A (2021) Deep Learning Guided Double Hidden Layer Neural Synchronization Through Mutual Learning. Neural Processing Letters 53:1355\u20131384","journal-title":"Neural Processing Letters"},{"key":"11772_CR55","doi-asserted-by":"publisher","first-page":"7253","DOI":"10.1007\/s11042-021-11812-0","volume":"81","author":"P Sarosh","year":"2022","unstructured":"Sarosh P, Parah SA, Bhat GM (2022) An efficient image encryption scheme for healthcare applications. Multimed Tools Appl 81:7253\u20137270","journal-title":"Multimed Tools Appl"},{"key":"11772_CR56","doi-asserted-by":"crossref","unstructured":"Selvarajan Shankar, Uddin Al-Shehari Alqahtani, Viriyasitavat W (2024) A smart decentralized identifiable distributed ledger technology-based blockchain (DIDLT-BC) model for cloud-IoT security. Expert Systems, pages 1\u201325","DOI":"10.1111\/exsy.13544"},{"key":"11772_CR57","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/s10462-024-10829-9","volume":"57","author":"S Selvarajan","year":"2024","unstructured":"Selvarajan S (2024) A comprehensive study on modern optimization techniques for engineering applications. Artif Intell Rev 57:194\u2013194","journal-title":"Artif Intell Rev"},{"key":"11772_CR58","doi-asserted-by":"publisher","first-page":"7107","DOI":"10.1038\/s41598-023-34354-x","volume":"13","author":"S Selvarajan","year":"2023","unstructured":"Selvarajan S, Mouratidis H (2023) A quantum trust and consultative transaction-based blockchain cybersecurity model for healthcare systems. Sci Rep 13:7107\u20137107","journal-title":"Sci Rep"},{"key":"11772_CR59","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1186\/s13677-023-00412-y","volume":"12","author":"S Selvarajan","year":"2023","unstructured":"Selvarajan S, Srivastava G, Khadidos AO (2023) An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems. J Cloud Comp 12:38\u201338","journal-title":"J Cloud Comp"},{"key":"11772_CR60","doi-asserted-by":"crossref","unstructured":"Shi H, Dao SD, Cai J (2024) LLMFormer: Large Language Model for Open-Vocabulary Semantic Segmentation. International Journal of Computer Vision. doi,","DOI":"10.1007\/s11263-024-02171-y"},{"key":"11772_CR61","doi-asserted-by":"publisher","first-page":"24075","DOI":"10.1007\/s11042-020-09108-w","volume":"79","author":"L Sleem","year":"2020","unstructured":"Sleem L, Couturier R (2020) Tools for a randomness evaluation for famous multimedia ciphers. Multimed Tools Appl 79:24075\u201324088","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"11772_CR62","doi-asserted-by":"publisher","first-page":"411","DOI":"10.12988\/astp.2015.5342","volume":"9","author":"B Stoyanov","year":"2015","unstructured":"Stoyanov B, Kordov K (2015) Novel secure pseudo-random number generation scheme based on two tinkerbell maps. Advanced Studies in 6eoretical Physics 9(9):411\u2013421","journal-title":"Advanced Studies in 6eoretical Physics"},{"issue":"3","key":"11772_CR63","doi-asserted-by":"publisher","first-page":"1175","DOI":"10.1109\/TNSM.2018.2861717","volume":"15","author":"G Sun","year":"2018","unstructured":"Sun G, Li Y, Liao D, Chang V (2018) Service Function Chain Orchestration Across Multiple Domains: A Full Mesh Aggregation Approach. IEEE Transactions on Network and Service Management 15(3):1175\u20131191","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"2","key":"11772_CR64","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1109\/TSC.2015.2477825","volume":"11","author":"G Sun","year":"2018","unstructured":"Sun G, Liao D, Zhao D, Xu Z, Yu H (2018) Live Migration for Multiple Correlated Virtual Machines in Cloud-Based Data Centers. IEEE Transactions on Services Computing 11(2):279\u2013291","journal-title":"IEEE Transactions on Services Computing"},{"issue":"12","key":"11772_CR65","doi-asserted-by":"publisher","first-page":"24672","DOI":"10.1109\/TITS.2022.3198046","volume":"23","author":"G Sun","year":"2022","unstructured":"Sun G, Sheng L, Luo L, Yu H (2022) Game Theoretic Approach for Multipriority Data Transmission in 5G Vehicular Networks. IEEE Transactions on Intelligent Transportation Systems 23(12):24672\u201324685","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"7","key":"11772_CR66","doi-asserted-by":"publisher","first-page":"5760","DOI":"10.1109\/JIOT.2019.2937110","volume":"7","author":"G Sun","year":"2020","unstructured":"Sun G, Xu Z, Yu H, Chen X, Chang V, Vasilakos AV (2020) Low-Latency and Resource-Efficient Service Function Chaining Orchestration in Network Function Virtualization. IEEE Internet of Things Journal 7(7):5760\u20135772","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"11772_CR67","doi-asserted-by":"publisher","first-page":"3877","DOI":"10.1109\/JSYST.2018.2879883","volume":"13","author":"G Sun","year":"2019","unstructured":"Sun G, Zhu G, Liao D, Yu H, Du X, Guizani M (2019) Cost-Efficient Service Function Chain Orchestration for Low-Latency Applications in NFV Networks. IEEE Systems Journal 13(4):3877\u20133888","journal-title":"IEEE Systems Journal"},{"key":"11772_CR68","doi-asserted-by":"publisher","first-page":"4947","DOI":"10.1038\/s41598-024-55044-2","volume":"14","author":"SA Syed","year":"2024","unstructured":"Syed SA, Manickam S, Uddin M (2024) Dickson polynomial-based secure group authentication scheme for Internet of Things. Sci Rep 14:4947\u20134947","journal-title":"Sci Rep"},{"key":"11772_CR69","doi-asserted-by":"crossref","unstructured":"Teodoro AAM, Gomes OSM, Saadi M et\u00a0al (2021) An FPGA-Based Performance Evaluation of Artificial Neural Network Architecture Algorithm for IoT. Wireless Personal Communications","DOI":"10.1007\/s11277-021-08566-1"},{"issue":"6","key":"11772_CR70","doi-asserted-by":"publisher","first-page":"307","DOI":"10.3390\/fractalfract8060307","volume":"8","author":"H Tian","year":"2024","unstructured":"Tian H, Zhao M, Liu J, Wang Q, Yu X, Wang Z (2024) Dynamic Analysis and Sliding Mode Synchronization Control of Chaotic Systems with Conditional Symmetric Fractional-Order Memristors. Fractal and Fractional 8(6):307\u2013307","journal-title":"Fractal and Fractional"},{"key":"11772_CR71","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.vlsi.2023.01.008","volume":"90","author":"A Trujillo-Toledo","year":"2023","unstructured":"Trujillo-Toledo A, L\u00f3pez-Bonilla OR, Garc\u00eda-Guerrero EE, Esqueda-Elizondo JJ, C\u00e1rdenas-Valdez JR, Tamayo-P\u00e9rez UJ, Aguirre-Castro OA, Inzunza-Gonz\u00e1lez E (2023) Real-time medical image encryption for H-IoT applications using improved sequences from chaotic maps. Integration 90:131\u2013145","journal-title":"Integration"},{"key":"11772_CR72","doi-asserted-by":"crossref","unstructured":"Tutueva AV, Nepomuceno EG, Karimov AI, Andreev VS, Butusov DN (2020) Adaptive chaotic maps and their application to pseudo-random numbers generation. Chaos, Solitons & Fractals, 133","DOI":"10.1016\/j.chaos.2020.109615"},{"key":"11772_CR73","doi-asserted-by":"crossref","unstructured":"Wang Xingyuan, Chen Xuan (2021) An image encryption algorithm based on dynamic row scrambling and Zigzag transformation. Chaos, Solitons & Fractals, 147","DOI":"10.1016\/j.chaos.2021.110962"},{"issue":"4","key":"11772_CR74","doi-asserted-by":"publisher","first-page":"2373","DOI":"10.1007\/s11071-015-2488-0","volume":"83","author":"Y Wang","year":"2016","unstructured":"Wang Y, Liu Z, Ma J, He H (2016) A pseudorandom number generator based on piecewise logistic map. Nonlinear Dynamics 83(4):2373\u20132391","journal-title":"Nonlinear Dynamics"},{"key":"11772_CR75","doi-asserted-by":"crossref","unstructured":"Wang E et al (2018) An efficient prediction-based user recruitment for mobile crowdsensing","DOI":"10.1109\/TMC.2017.2702613"},{"key":"11772_CR76","doi-asserted-by":"crossref","unstructured":"Wang Q et al (2024). Elevator fault diagnosis based on digital twin and PINNs-e-RGCN","DOI":"10.1038\/s41598-024-78784-7"},{"key":"11772_CR77","doi-asserted-by":"crossref","unstructured":"Wang F et al (2024) Prescribed performance adaptive robust control for robotic manipulators with fuzzy uncertainty","DOI":"10.1109\/TFUZZ.2023.3323090"},{"key":"11772_CR78","doi-asserted-by":"crossref","unstructured":"Wang Z et al (2024) ACR-Net: learning high-accuracy optical flow via adaptive-aware correlation recurrent network","DOI":"10.1109\/TCSVT.2024.3395636"},{"issue":"1","key":"11772_CR79","doi-asserted-by":"publisher","first-page":"15225","DOI":"10.1088\/1402-4896\/ad9552","volume":"100","author":"Z Wang","year":"2025","unstructured":"Wang Z, Yang Y, Parastesh F, Cao S, Wang J (2025) Chaotic dynamics of a carbon nanotube oscillator with symmetry-breaking. Physica Scripta 100(1):15225\u201315225","journal-title":"Physica Scripta"},{"key":"11772_CR80","doi-asserted-by":"crossref","unstructured":"Wang X et al (2025) Interpretability study of a typical fault diagnosis model for nuclear power plant primary circuit based on a graph neural network","DOI":"10.1016\/j.ress.2025.111151"},{"issue":"4","key":"11772_CR81","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1109\/MNET.018.2300125","volume":"37","author":"Z Xiao","year":"2023","unstructured":"Xiao Z, Shu J, Jiang H, Min G, Chen H, Han Z (2023) Overcoming Occlusions: Perception Task-Oriented Information Sharing in Connected and Autonomous Vehicles. IEEE Network 37(4):224\u2013229","journal-title":"IEEE Network"},{"key":"11772_CR82","doi-asserted-by":"crossref","unstructured":"Xiong J, Chen Y (2025) RBFNN-based parameter adaptive sliding mode control for an uncertain TQUAV with time-varying mass","DOI":"10.1002\/rnc.7932"},{"key":"11772_CR83","doi-asserted-by":"crossref","unstructured":"Xu G, Kong D, Zhang K, Xu S, Cao Y, Mao Y, Chen X (2024) A Model Value Transfer Incentive Mechanism for Federated Learning With Smart Contracts in AIoT. IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2024.3468443"},{"key":"11772_CR84","doi-asserted-by":"crossref","unstructured":"Xu Y, Ding L, He P, Lu Z, Zhang J (2024) META: A Memory-Efficient Tri-Stage Polynomial Multiplication Accelerator Using 2D Coupled-BFUs. IEEE Transactions on Circuits and Systems I: Regular Papers, pages 1\u201314","DOI":"10.1109\/TCSI.2024.3461736"},{"key":"11772_CR85","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.ins.2021.02.064","volume":"566","author":"J Yang","year":"2021","unstructured":"Yang J, Yang F, Zhou Y, Wang D, Li R, Wang G, Chen W (2021) A data-driven structural damage detection framework based on parallel convolutional neural network and bidirectional gated recurrent unit. Information Sciences 566:103\u2013117","journal-title":"Information Sciences"},{"issue":"24","key":"11772_CR86","doi-asserted-by":"publisher","first-page":"21656","DOI":"10.1109\/JIOT.2023.3317639","volume":"10","author":"J Yang","year":"2023","unstructured":"Yang J, Yang K, Xiao Z, Jiang H, Xu S, Dustdar S (2023) Improving Commute Experience for Private Car Users via Blockchain-Enabled Multitask Learning. IEEE Internet of Things Journal 10(24):21656\u201321669","journal-title":"IEEE Internet of Things Journal"},{"key":"11772_CR87","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.ins.2020.05.090","volume":"540","author":"J Yang","year":"2020","unstructured":"Yang J, Zhang L, Chen C, Li Y, Li R, Wang G, Zeng Z (2020) A hierarchical deep convolutional neural network and gated recurrent unit framework for structural damage detection. Information Sciences 540:117\u2013130","journal-title":"Information Sciences"},{"key":"11772_CR88","doi-asserted-by":"publisher","first-page":"112649","DOI":"10.1016\/j.asoc.2024.112649","volume":"169","author":"Y Yang","year":"2024","unstructured":"Yang Y, Li H (2024) Neural Ordinary Differential Equations for Robust Parameter Estimation in Dynamic Systems with Physical Priors. Applied Soft Computing 169:112649\u2013112649","journal-title":"Applied Soft Computing"},{"issue":"3","key":"11772_CR89","doi-asserted-by":"publisher","first-page":"2315","DOI":"10.32604\/cmes.2024.050853","volume":"140","author":"L Yin","year":"2024","unstructured":"Yin L, Wang L, Lu S, Wang R, Ren H, Alsanad A, Zheng W (2024) AFBNet: A Lightweight Adaptive Feature Fusion Module for Super-Resolution Algorithms. Computer Modeling in Engineering & Sciences 140(3):2315\u20132347","journal-title":"Computer Modeling in Engineering & Sciences"},{"key":"11772_CR90","doi-asserted-by":"crossref","unstructured":"Yu F, Liu L, Shen H (2020) Dynamic analysis, Circuit design and Synchronization of a novel 6D memristive four-wing hyperchaotic system with multiple coexisting attractors. Complexity","DOI":"10.1155\/2020\/5904607"},{"key":"11772_CR91","doi-asserted-by":"crossref","unstructured":"Zhang X, Hou D, Xiong Z, Liu Y, Wang S, Li Y (2024) EALLR: Energy-Aware Low-Latency Routing Data Driven Model in Mobile Edge Computing. IEEE Transactions on Consumer Electronics","DOI":"10.1109\/TCE.2024.3507158"},{"key":"11772_CR92","doi-asserted-by":"crossref","unstructured":"Zhao Y, Gao C, Liu J (2019) A self-perturbed pseudorandom sequence generator based on hyperchaos. Chaos solutions & Fractals, 4","DOI":"10.1016\/j.csfx.2020.100023"},{"issue":"9","key":"11772_CR93","doi-asserted-by":"publisher","first-page":"2103","DOI":"10.3390\/rs14092103","volume":"14","author":"G Zhou","year":"2022","unstructured":"Zhou G, Wang Z, Li Q (2022) Spatial Negative Co-Location Pattern Directional Mining Algorithm with Join-Based Prevalence. Remote Sensing 14(9):2103\u20132103","journal-title":"Remote Sensing"},{"key":"11772_CR94","doi-asserted-by":"crossref","unstructured":"Zhou Z et al (2023) A twisted gaussian risk model considering target vehicle longitudinal-lateral motion states for host vehicle trajectory planning","DOI":"10.1109\/TITS.2023.3298110"},{"key":"11772_CR95","doi-asserted-by":"crossref","unstructured":"Zhou Z et al (2025) Resource-saving and high-robustness image sensing based on binary optical computing","DOI":"10.1002\/lpor.202400936"},{"key":"11772_CR96","doi-asserted-by":"crossref","unstructured":"Zhou Shuang, Wang Xingyuan, Wang Mingxu, Zhang Yingqian (2020) Simple colour image cryptosystem with very high level of security. Chaos, Solitons & Fractals, 141","DOI":"10.1016\/j.chaos.2020.110225"},{"key":"11772_CR97","unstructured":"Zhu C (2023) Research on emotion recognition-based smart assistant system: emotional intelligence and personalized services"},{"key":"11772_CR98","doi-asserted-by":"crossref","unstructured":"Zhu C (2024) Computational intelligence-based classification system for the diagnosis of memory impairment in psychoactive substance users","DOI":"10.21203\/rs.3.rs-2892492\/v1"},{"key":"11772_CR99","doi-asserted-by":"crossref","unstructured":"Zhu D et al (2025) Hybrid model integrating fuzzy systems and convolutional factorization machine for delivery time prediction in intelligent logistics","DOI":"10.1109\/TFUZZ.2024.3472043"},{"key":"11772_CR100","doi-asserted-by":"publisher","first-page":"127195","DOI":"10.1016\/j.neucom.2023.127195","volume":"572","author":"E Zhu","year":"2024","unstructured":"Zhu E, Wang H, Zhang Y, Zhang K, Liu C (2024) PHEE: Identifying influential nodes in social networks with a phased evaluation-enhanced search. Neurocomputing 572:127195\u2013127195","journal-title":"Neurocomputing"},{"issue":"3","key":"11772_CR101","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3507921","volume":"18","author":"X Zou","year":"2022","unstructured":"Zou X, Yuan J, Shilane P, Xia W, Zhang H, Wang X (2022) From Hyper-Dimensional Structures to Linear Structures: Maintaining Deduplicated Data\u2019s Locality. ACM Transactions on Storage 18(3):1\u201328","journal-title":"ACM Transactions on Storage"}],"container-title":["Neural Processing Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-025-11772-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11063-025-11772-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-025-11772-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T06:01:49Z","timestamp":1750917709000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11063-025-11772-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,26]]},"references-count":101,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["11772"],"URL":"https:\/\/doi.org\/10.1007\/s11063-025-11772-8","relation":{},"ISSN":["1573-773X"],"issn-type":[{"value":"1573-773X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,26]]},"assertion":[{"value":"10 May 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 May 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No interests of a financial or personal nature.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"50"}}