{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:19:05Z","timestamp":1772302745528,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T00:00:00Z","timestamp":1724803200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T00:00:00Z","timestamp":1724803200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s13042-024-02310-4","type":"journal-article","created":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T03:40:04Z","timestamp":1724816404000},"page":"891-917","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Artificial recurrent neural network coordinated secured transmission towards safeguarding confidentiality in smart Industrial Internet of Things"],"prefix":"10.1007","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4951-4729","authenticated-orcid":false,"given":"Arindam","family":"Sarkar","sequence":"first","affiliation":[]},{"given":"Moirangthem Marjit","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Hanjabam Saratchandra","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,28]]},"reference":[{"issue":"4","key":"2310_CR1","doi-asserted-by":"crossref","first-page":"2663","DOI":"10.1007\/s11277-019-06544-2","volume":"108","author":"B Bi","year":"2019","unstructured":"Bi B, Huang D, Mi B et al (2019) Efficient LBS security-preserving based on NTRU oblivious transfer. Wirel Pers Commun 108(4):2663\u20132674","journal-title":"Wirel Pers Commun"},{"issue":"5","key":"2310_CR2","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MNET.011.1900536","volume":"34","author":"B Cao","year":"2020","unstructured":"Cao B, Wang X, Zhang W et al (2020) A many-objective optimization model of Industrial Internet of Things based on private blockchain. IEEE Netw 34(5):78\u201383","journal-title":"IEEE Netw"},{"key":"2310_CR3","doi-asserted-by":"publisher","unstructured":"Chen C,  Cui J, Qu G,  Zhang J. WRITE+SYNC: Software Cache Write Covert Channels Exploiting Memory-disk Synchronization. In: IEEE Transactions on Information Forensics and Security. https:\/\/doi.org\/10.1109\/TIFS.2024.3414255","DOI":"10.1109\/TIFS.2024.3414255"},{"issue":"11","key":"2310_CR4","doi-asserted-by":"crossref","first-page":"19954","DOI":"10.1109\/TITS.2022.3182410","volume":"23","author":"J Chen","year":"2022","unstructured":"Chen J, Wang Q, Cheng HH et al (2022) A review of vision-based traffic semantic understanding in ITSs. IEEE Trans Intell Transp Syst 23(11):19954\u201319979","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"9","key":"2310_CR5","doi-asserted-by":"crossref","first-page":"10067","DOI":"10.1109\/TITS.2023.3269794","volume":"24","author":"J Chen","year":"2023","unstructured":"Chen J, Xu M, Xu W et al (2023) A flow feedback traffic prediction based on visual quantified features. IEEE Trans Intell Transp Syst 24(9):10067\u201310075","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"4","key":"2310_CR6","doi-asserted-by":"crossref","first-page":"2331","DOI":"10.1109\/TII.2021.3096840","volume":"18","author":"W Dai","year":"2022","unstructured":"Dai W, Zhou X, Li D et al (2022) Hybrid parallel stochastic configuration networks for industrial data analytics. IEEE Trans Ind Inform 18(4):2331\u20132341","journal-title":"IEEE Trans Ind Inform"},{"issue":"16","key":"2310_CR7","doi-asserted-by":"crossref","first-page":"12505","DOI":"10.1109\/JIOT.2020.3019398","volume":"8","author":"Y Ding","year":"2021","unstructured":"Ding Y, Zhang W, Zhou X et al (2021) FraudTrip: taxi fraudulent trip detection from corresponding trajectories. IEEE Internet Things J 8(16):12505\u201312517","journal-title":"IEEE Internet Things J"},{"key":"2310_CR8","doi-asserted-by":"crossref","unstructured":"Dolecki M, Kozera R (2015) The impact of the TPM weights distribution on network synchronization time. In: Computer information systems and industrial management, vol 9339. Springer, pp 451\u2013460","DOI":"10.1007\/978-3-319-24369-6_37"},{"issue":"11","key":"2310_CR9","doi-asserted-by":"publisher","first-page":"4999","DOI":"10.1109\/TNNLS.2019.2955165","volume":"31","author":"T Dong","year":"2020","unstructured":"Dong T, Huang T (2020) Neural cryptography based on complex-valued neural network. IEEE Trans Neural Netw Learn Syst 31(11):4999\u20135004. https:\/\/doi.org\/10.1109\/TNNLS.2019.2955165","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"4","key":"2310_CR10","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1016\/j.cnsns.2013.08.032","volume":"19","author":"M Franois","year":"2014","unstructured":"Franois M, Grosges T, Barchiesi D (2014) Pseudo-random number generator based on mixing of three chaotic maps. Commun Nonlinear Sci Numer Simul 19(4):887\u2013895","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"2310_CR11","doi-asserted-by":"publisher","unstructured":"Guo R, Liu H, Liu D (2024) When Deep Learning-Based Soft Sensors Encounter Reliability Challenges: A Practical Knowledge-Guided Adversarial Attack and Its Defense. In: IEEE Transactions on Industrial Informatics 20(2):2702\u20132714. https:\/\/doi.org\/10.1109\/TII.2023.3297663","DOI":"10.1109\/TII.2023.3297663"},{"key":"2310_CR12","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.future.2024.05.006","volume":"159","author":"J Hao","year":"2024","unstructured":"Hao J, Chen P, Chen J et al (2024) Multi-task federated learning-based system anomaly detection and multi-classification for microservices architecture. Future Gener Comput Syst 159:77\u201390","journal-title":"Future Gener Comput Syst"},{"key":"2310_CR13","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6680782","author":"S Jeong","year":"2021","unstructured":"Jeong S, Park C, Hong D et al (2021) Neural cryptography based on generalized tree parity machine for real-life systems. Secur Commun Netw. https:\/\/doi.org\/10.1155\/2021\/6680782","journal-title":"Secur Commun Netw"},{"issue":"5","key":"2310_CR14","doi-asserted-by":"crossref","first-page":"2228","DOI":"10.1109\/TNET.2021.3084251","volume":"29","author":"H Jiang","year":"2021","unstructured":"Jiang H, Wang M, Zhao P et al (2021) A utility-aware general framework with quantifiable privacy preservation for destination prediction in LBSs. IEEE\/ACM Trans Netw 29(5):2228\u20132241","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"1","key":"2310_CR15","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/TMC.2020.3005908","volume":"21","author":"H Jiang","year":"2022","unstructured":"Jiang H, Xiao Z, Li Z et al (2022) An energy-efficient framework for Internet of Things underlaying heterogeneous small cell networks. IEEE Trans Mob Comput 21(1):31\u201343","journal-title":"IEEE Trans Mob Comput"},{"key":"2310_CR16","doi-asserted-by":"publisher","first-page":"106800","DOI":"10.1016\/j.engappai.2023.106800","volume":"126","author":"A Kumar","year":"2023","unstructured":"Kumar A, Singh S, Das S et al (2023) Projective quasi-synchronization of complex-valued recurrent neural networks with proportional delay and mismatched parameters via matrix measure approach. Eng Appl Artifi Intell 126:106800. https:\/\/doi.org\/10.1016\/j.engappai.2023.106800","journal-title":"Eng Appl Artifi Intell"},{"issue":"13","key":"2310_CR17","doi-asserted-by":"crossref","first-page":"19643","DOI":"10.1007\/s11042-023-14360-x","volume":"82","author":"S Li","year":"2023","unstructured":"Li S, Chen J, Peng W et al (2023) A vehicle detection method based on disparity segmentation. Multimed Tools Appl 82(13):19643\u201319655","journal-title":"Multimed Tools Appl"},{"key":"2310_CR18","doi-asserted-by":"publisher","unstructured":"Li W, Susilo W, Xia C, Huang L, Guo F, Wang T,  Li W et al (2024) Secure Data Integrity Check Based on Verified Public Key Encryption with Equality Test for Multi-Cloud Storage. In: IEEE Transactions on Dependable and Secure Computing 1:1\u201315. https:\/\/doi.org\/10.1109\/TDSC.2024.3375369","DOI":"10.1109\/TDSC.2024.3375369"},{"key":"2310_CR19","first-page":"1","volume":"73","author":"X Li","year":"2024","unstructured":"Li X, Lu Z, Yuan M et al (2024) Tradeoff of code estimation error rate and terminal gain in SCER attack. IEEE Trans Instrum Meas 73:1\u201312","journal-title":"IEEE Trans Instrum Meas"},{"issue":"1","key":"2310_CR20","doi-asserted-by":"crossref","first-page":"1498","DOI":"10.1038\/s41467-024-45745-7","volume":"15","author":"Z Li","year":"2024","unstructured":"Li Z, Zhou W, Zhou Z et al (2024) Self-supervised dynamic learning for long-term high-fidelity image transmission through unstabilized diffusive media. Nat Commun 15(1):1498","journal-title":"Nat Commun"},{"issue":"1","key":"2310_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3517013","volume":"19","author":"D Liu","year":"2022","unstructured":"Liu D, Cao Z, Jiang H et al (2022) Concurrent low-power listening: a new design paradigm for duty-cycling communication. ACM Trans Sens Netw 19(1):1\u201324","journal-title":"ACM Trans Sens Netw"},{"key":"2310_CR22","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1049\/iet-ifs.2014.0192","volume":"10","author":"L Liu","year":"2016","unstructured":"Liu L, Miao S, Hu H et al (2016) Pseudo-random bit generator based on non-stationary logistic maps. IET Inf Secur 10:87\u201394","journal-title":"IET Inf Secur"},{"issue":"6","key":"2310_CR23","doi-asserted-by":"crossref","first-page":"4015","DOI":"10.1109\/TCYB.2022.3225106","volume":"53","author":"L Liu","year":"2023","unstructured":"Liu L, Zhang S, Zhang L et al (2023) Multi-UUV maneuvering counter-game for dynamic target scenario based on fractional-order recurrent neural network. IEEE Trans Cybern 53(6):4015\u20134028","journal-title":"IEEE Trans Cybern"},{"key":"2310_CR24","doi-asserted-by":"crossref","first-page":"6623","DOI":"10.1109\/TIP.2021.3096060","volume":"30","author":"Q Liu","year":"2021","unstructured":"Liu Q, Yuan H, Hamzaoui R et al (2021) Reduced reference perceptual quality model with application to rate control for video-based point cloud compression. IEEE Trans Image Process 30:6623\u20136636","journal-title":"IEEE Trans Image Process"},{"key":"2310_CR25","doi-asserted-by":"crossref","first-page":"103163","DOI":"10.1016\/j.sysarc.2024.103163","volume":"152","author":"Y Liu","year":"2024","unstructured":"Liu Y, Jia Z, Jiang Z et al (2024) BFL-SA: blockchain-based federated learning via enhanced secure aggregation. J Syst Architect 152:103163","journal-title":"J Syst Architect"},{"issue":"1","key":"2310_CR26","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1007\/s11227-021-03898-y","volume":"78","author":"J Luo","year":"2022","unstructured":"Luo J, Zhao C, Chen Q et al (2022) Using deep belief network to construct the agricultural information system based on Internet of Things. J Supercomput 78(1):379\u2013405","journal-title":"J Supercomput"},{"issue":"3","key":"2310_CR27","first-page":"426","volume":"58","author":"J Ma","year":"2022","unstructured":"Ma J, Hu J (2022) Safe consensus control of cooperative-competitive multi-agent systems via differential privacy. Kybernetika 58(3):426\u2013439","journal-title":"Kybernetika"},{"key":"2310_CR28","doi-asserted-by":"publisher","unstructured":"Qi M, Cui S, Chang X, Xu Y, Meng H, Wang Y, Yin T, Arif M (2022) Multi-region Nonuniform Brightness Correction Algorithm Based on L-Channel Gamma Transform. Sec Commun Netw 2022. https:\/\/doi.org\/10.1155\/2022\/2675950","DOI":"10.1155\/2022\/2675950"},{"key":"2310_CR29","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1007\/s11063-021-10443-8","volume":"53","author":"A Sarkar","year":"2021","unstructured":"Sarkar A (2021) Deep learning guided double hidden layer neural synchronization through mutual learning. Neural Process Lett 53:1355\u20131384. https:\/\/doi.org\/10.1007\/s11063-021-10443-8","journal-title":"Neural Process Lett"},{"key":"2310_CR30","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/s40747-021-00344-7","volume":"8","author":"A Sarkar","year":"2022","unstructured":"Sarkar A (2022) Mutual learning-based efficient synchronization of neural networks to exchange the neural key. Complex Intell Syst 8:307\u2013321","journal-title":"Complex Intell Syst"},{"key":"2310_CR31","doi-asserted-by":"crossref","first-page":"111731","DOI":"10.1016\/j.asoc.2024.111731","volume":"161","author":"A Sarkar","year":"2024","unstructured":"Sarkar A (2024) Recurrent neural networks-guided vector-valued synchronized key exchange for secure and privacy-preserving communication in Industrial Internet of Things. Appl Soft Comput 161:111731","journal-title":"Appl Soft Comput"},{"key":"2310_CR32","doi-asserted-by":"crossref","unstructured":"Diah Septiyana, Mohamed Abd. Rahman, Tasnim Firdaus Mohamed Ariff, Nor Aiman Sukindar, Erry Yulian T. Adesta (2023). Enhancing Water Sustainability Index Assessment Through Risk Management, Iot, and Artificial Intelligence in Water Operation: A Review.\u00a0 Water Conservation & Management, 7(2): 97-106.","DOI":"10.26480\/wcm.02.2023.97.106"},{"issue":"17","key":"2310_CR33","doi-asserted-by":"crossref","first-page":"15538","DOI":"10.1109\/JIOT.2022.3181607","volume":"9","author":"X Shen","year":"2022","unstructured":"Shen X, Jiang H, Liu D et al (2022) PupilRec: leveraging pupil morphology for recommending on smartphones. IEEE Internet Things J 9(17):15538\u201315553","journal-title":"IEEE Internet Things J"},{"key":"2310_CR34","doi-asserted-by":"crossref","first-page":"8997","DOI":"10.1007\/s11063-023-11189-1","volume":"55","author":"X Song","year":"2023","unstructured":"Song X, Wu N, Song S (2023) Switching-like event-triggered state estimation for reaction\u2013diffusion neural networks against DoS attacks. Neural Process Lett 55:8997\u20139018","journal-title":"Neural Process Lett"},{"key":"2310_CR35","doi-asserted-by":"crossref","first-page":"126498","DOI":"10.1016\/j.neucom.2023.126498","volume":"550","author":"X Song","year":"2023","unstructured":"Song X, Wu N, Song S et al (2023) Bipartite synchronization for cooperative-competitive neural networks with reaction\u2013diffusion terms via dual event-triggered mechanism. Neurocomputing 550:126498","journal-title":"Neurocomputing"},{"issue":"3","key":"2310_CR36","doi-asserted-by":"crossref","first-page":"181","DOI":"10.3934\/mmc.2023016","volume":"2023","author":"V Stojanovic","year":"2023","unstructured":"Stojanovic V (2023) Fault-tolerant control of a hydraulic servo actuator via adaptive dynamic programming. J Math Model Control 2023(3):181\u2013191","journal-title":"J Math Model Control"},{"issue":"9","key":"2310_CR37","doi-asserted-by":"crossref","first-page":"411","DOI":"10.12988\/astp.2015.5342","volume":"9","author":"B Stoyanov","year":"2015","unstructured":"Stoyanov B, Kordov K (2015) Novel secure pseudo-random number generation scheme based on two tinkerbell maps. Adv Stud Theor Phys 9(9):411\u2013421","journal-title":"Adv Stud Theor Phys"},{"issue":"3","key":"2310_CR38","doi-asserted-by":"crossref","first-page":"1175","DOI":"10.1109\/TNSM.2018.2861717","volume":"15","author":"G Sun","year":"2018","unstructured":"Sun G, Li Y, Liao D et al (2018) Service function chain orchestration across multiple domains: a full mesh aggregation approach. IEEE Trans Netw Serv Manag 15(3):1175\u20131191","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"2","key":"2310_CR39","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1109\/TSC.2015.2477825","volume":"11","author":"G Sun","year":"2018","unstructured":"Sun G, Liao D, Zhao D et al (2018) Live migration for multiple correlated virtual machines in cloud-based data centers. IEEE Trans Serv Comput 11(2):279\u2013291","journal-title":"IEEE Trans Serv Comput"},{"issue":"4","key":"2310_CR40","doi-asserted-by":"crossref","first-page":"3877","DOI":"10.1109\/JSYST.2018.2879883","volume":"13","author":"G Sun","year":"2019","unstructured":"Sun G, Zhu G, Liao D et al (2019) Cost-efficient service function chain orchestration for low-latency applications in NFV networks. IEEE Syst J 13(4):3877\u20133888","journal-title":"IEEE Syst J"},{"issue":"7","key":"2310_CR41","doi-asserted-by":"crossref","first-page":"5760","DOI":"10.1109\/JIOT.2019.2937110","volume":"7","author":"G Sun","year":"2020","unstructured":"Sun G, Xu Z, Yu H et al (2020) Low-latency and resource-efficient service function chaining orchestration in network function virtualization. IEEE Internet Things J 7(7):5760\u20135772","journal-title":"IEEE Internet Things J"},{"issue":"10","key":"2310_CR42","doi-asserted-by":"crossref","first-page":"7155","DOI":"10.1109\/TII.2020.3042872","volume":"17","author":"G Sun","year":"2021","unstructured":"Sun G, Xu Z, Yu H et al (2021) Dynamic network function provisioning to enable network in box for industrial applications. IEEE Trans Ind Inform 17(10):7155\u20137164","journal-title":"IEEE Trans Ind Inform"},{"key":"2310_CR43","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08566-1","author":"A Teodoro","year":"2021","unstructured":"Teodoro A, Gomes O, Saadi M et al (2021) An FPGA-based performance evaluation of artificial neural network architecture algorithm for IoT. Wirel Pers Commun. https:\/\/doi.org\/10.1007\/s11277-021-08566-1","journal-title":"Wirel Pers Commun"},{"key":"2310_CR44","doi-asserted-by":"crossref","first-page":"109615","DOI":"10.1016\/j.chaos.2020.109615","volume":"133","author":"AV Tutueva","year":"2020","unstructured":"Tutueva AV, Nepomuceno EG, Karimov AI et al (2020) Adaptive chaotic maps and their application to pseudo-random numbers generation. Chaos Solitons Fractals 133:109615","journal-title":"Chaos Solitons Fractals"},{"key":"2310_CR45","doi-asserted-by":"crossref","first-page":"5257","DOI":"10.1109\/TIP.2022.3192706","volume":"31","author":"S Wang","year":"2022","unstructured":"Wang S, Sheng H, Yang D et al (2022) Extendable multiple nodes recurrent tracking framework with RTU++. IEEE Trans Image Process 31:5257\u20135271","journal-title":"IEEE Trans Image Process"},{"issue":"4","key":"2310_CR46","doi-asserted-by":"crossref","first-page":"2373","DOI":"10.1007\/s11071-015-2488-0","volume":"83","author":"Y Wang","year":"2016","unstructured":"Wang Y, Liu Z, Ma J et al (2016) A pseudorandom number generator based on piecewise logistic map. Nonlinear Dyn 83(4):2373\u20132391","journal-title":"Nonlinear Dyn"},{"issue":"7","key":"2310_CR47","doi-asserted-by":"crossref","first-page":"1230","DOI":"10.3390\/electronics13071230","volume":"13","author":"G Xie","year":"2024","unstructured":"Xie G, Hou G, Pei Q et al (2024) Lightweight privacy protection via adversarial sample. Electronics 13(7):1230","journal-title":"Electronics"},{"issue":"6","key":"2310_CR48","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/s11265-024-01918-7","volume":"96","author":"Z Xuemin","year":"2024","unstructured":"Xuemin Z, Haitao D, Zenggang X et al (2024) Self-organizing key security management algorithm in socially aware networking. J Signal Process Syst 96(6):369\u2013383","journal-title":"J Signal Process Syst"},{"issue":"2","key":"2310_CR49","doi-asserted-by":"crossref","first-page":"907","DOI":"10.1109\/TMTT.2022.3205612","volume":"71","author":"Y Yang","year":"2023","unstructured":"Yang Y, Zhang Z, Zhou Y et al (2023) Design of a simultaneous information and power transfer system based on a modulating feature of magnetron. IEEE Trans Microw Theory Tech 71(2):907\u2013915","journal-title":"IEEE Trans Microw Theory Tech"},{"issue":"8","key":"2310_CR50","doi-asserted-by":"crossref","first-page":"215","DOI":"10.3390\/drones6080215","volume":"6","author":"Y Yin","year":"2022","unstructured":"Yin Y, Guo Y, Su Q et al (2022) Task allocation of multiple unmanned aerial vehicles based on deep transfer reinforcement learning. Drones 6(8):215","journal-title":"Drones"},{"key":"2310_CR51","doi-asserted-by":"publisher","unstructured":"Yu F, Liu L, Shen H, Zhang Z, Huang Y, Shi C, Cai S, Wu X, Du S, Wan Q, Guo L (2020) Dynamic Analysis, Circuit Design, and Synchronization of a Novel 6D Memristive Four-Wing Hyperchaotic System with Multiple Coexisting Attractors. Complex. 2020. https:\/\/doi.org\/10.1155\/2020\/5904607","DOI":"10.1155\/2020\/5904607"},{"issue":"6","key":"2310_CR52","doi-asserted-by":"crossref","first-page":"155013292211043","DOI":"10.1177\/15501329221104330","volume":"18","author":"M Zhang","year":"2022","unstructured":"Zhang M, Zhang Y, Cen Q et al (2022) Deep learning-based resource allocation for secure transmission in a non-orthogonal multiple access network. Int J Distrib Sens Netw 18(6):15501329221104330","journal-title":"Int J Distrib Sens Netw"},{"key":"2310_CR53","doi-asserted-by":"publisher","unstructured":"Zhang R et al (2024) Differential Feature Awareness Network Within Antagonistic Learning for Infrared-Visible Object Detection. In: IEEE Transactions on Circuits and Systems for Video Technology 34(8):6735\u20136748. https:\/\/doi.org\/10.1109\/TCSVT.2023.3289142","DOI":"10.1109\/TCSVT.2023.3289142"},{"key":"2310_CR54","doi-asserted-by":"crossref","first-page":"29344","DOI":"10.1109\/ACCESS.2023.3260977","volume":"11","author":"X Zhang","year":"2023","unstructured":"Zhang X, Wang J, Xu J et al (2023) Detection of android malware based on deep forest and feature enhancement. IEEE Access 11:29344\u201329359","journal-title":"IEEE Access"},{"key":"2310_CR55","doi-asserted-by":"crossref","first-page":"100023","DOI":"10.1016\/j.csfx.2020.100023","volume":"4","author":"Y Zhao","year":"2019","unstructured":"Zhao Y, Gao C, Liu J (2019) A self-perturbed pseudorandom sequence generator based on hyperchaos. Chaos Solitons Fractals 4:100023","journal-title":"Chaos Solitons Fractals"},{"key":"2310_CR56","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1007\/s44196-023-00345-z","volume":"16","author":"W Zheng","year":"2023","unstructured":"Zheng W, Gong G, Tian J (2023) Design of a modified transformer architecture based on relative position coding. Int J Comput Intell Syst 16:168","journal-title":"Int J Comput Intell Syst"},{"issue":"3","key":"2310_CR57","doi-asserted-by":"crossref","first-page":"5002","DOI":"10.1109\/LRA.2021.3070828","volume":"6","author":"P Zhou","year":"2021","unstructured":"Zhou P, Peng R, Xu M et al (2021) Path planning with automatic seam extraction over point cloud models for robotic arc welding. IEEE Robot Autom Lett 6(3):5002\u20135009","journal-title":"IEEE Robot Autom Lett"},{"key":"2310_CR58","doi-asserted-by":"crossref","first-page":"3461","DOI":"10.1109\/TSMC.2022.3225381","volume":"53","author":"Z Zhuang","year":"2023","unstructured":"Zhuang Z, Tao H, Chen Y et al (2023) An optimal iterative learning control approach for linear systems with nonuniform trial lengths under input constraints. IEEE Trans Syst Man Cybern Syst 53:3461\u20133473","journal-title":"IEEE Trans Syst Man Cybern Syst"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02310-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-024-02310-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02310-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,4]],"date-time":"2025-02-04T10:41:29Z","timestamp":1738665689000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-024-02310-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,28]]},"references-count":58,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["2310"],"URL":"https:\/\/doi.org\/10.1007\/s13042-024-02310-4","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,28]]},"assertion":[{"value":"3 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No interests of a financial or personal nature.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}