{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T16:57:03Z","timestamp":1774803423728,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T00:00:00Z","timestamp":1731456000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T00:00:00Z","timestamp":1731456000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572521"],"award-info":[{"award-number":["61572521"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s40747-024-01606-w","type":"journal-article","created":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T07:03:38Z","timestamp":1731481418000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["GAN-based pseudo random number generation optimized through genetic algorithms"],"prefix":"10.1007","volume":"11","author":[{"given":"Xuguang","family":"Wu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2116-5408","authenticated-orcid":false,"given":"Yiliang","family":"Han","sequence":"additional","affiliation":[]},{"given":"Minqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Su","family":"Cui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,13]]},"reference":[{"key":"1606_CR1","doi-asserted-by":"publisher","DOI":"10.1201\/9781351133036","volume-title":"Introduction to modern cryptography","author":"J Katz","year":"2020","unstructured":"Katz J, Lindell Y (2020) Introduction to modern cryptography, 3rd edn. CRC Press, Boca Raton","edition":"3"},{"key":"1606_CR2","unstructured":"Rosulek M. The joy of cryptography. https:\/\/joyofcryptography.com\/. Accessed: 2023-11-10"},{"issue":"103431","key":"1606_CR3","volume":"73","author":"AA Pandit","year":"2023","unstructured":"Pandit AA, Kumar A, Mishra A (2023) LWR-based quantum-safe pseudo-random number generator. J Inf Secur Appl 73(103431):103431","journal-title":"J Inf Secur Appl"},{"key":"1606_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1103\/RevModPhys.89.015004","volume":"89","author":"M Herrero-Collantes","year":"2017","unstructured":"Herrero-Collantes M, Garcia-Escartin JC (2017) Quantum random number generators. Rev Mod Phys 89:1","journal-title":"Rev Mod Phys"},{"issue":"2","key":"1606_CR5","first-page":"324","volume":"9","author":"V Desai","year":"2012","unstructured":"Desai V, Patil R, Rao D (2012) Using layer recurrent neural network to generate pseudo random number sequences. Int J Comput Sci Issues 9(2):324\u2013334","journal-title":"Int J Comput Sci Issues"},{"key":"1606_CR6","doi-asserted-by":"crossref","unstructured":"Hameed SM, Ali LMM (2018) Utilizing hopfield neural network for pseudo-random number generator. In: 2018 IEEE\/ACS 15th International Conference on Computer Systems and Applications (AICCSA), pp. 1\u20135. IEEE","DOI":"10.1109\/AICCSA.2018.8612890"},{"issue":"10","key":"1606_CR7","doi-asserted-by":"publisher","first-page":"8324","DOI":"10.1007\/s11227-020-03229-7","volume":"76","author":"Y-S Jeong","year":"2020","unstructured":"Jeong Y-S, Oh K-J, Cho C-K, Choi H-J (2020) Pseudo-random number generation using LSTMs. J Supercomput 76(10):8324\u20138342. https:\/\/doi.org\/10.1007\/s11227-020-03229-7","journal-title":"J Supercomput"},{"key":"1606_CR8","unstructured":"Goodfellow IJ, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial networks arXiv:1406.2661"},{"key":"1606_CR9","doi-asserted-by":"crossref","unstructured":"De\u00a0Bernardi M, Khouzani MHR, Malacaria P (2019) Pseudo-random number generation using generative adversarial networks. In: ECML PKDD 2018 Workshops, pp. 191\u2013200. Springer, Cham","DOI":"10.1007\/978-3-030-13453-2_15"},{"key":"1606_CR10","doi-asserted-by":"crossref","unstructured":"Oak R, Rahalkar C, Gujar D (2019) Poster: Using generative adversarial networks for secure pseudorandom number generation. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, New York, NY, USA","DOI":"10.1145\/3319535.3363265"},{"key":"1606_CR11","doi-asserted-by":"crossref","unstructured":"Kim H, Kwon Y, Sim M, Lim S, Seo H (2021) Generative adversarial networks-based pseudo-random number generator for embedded processors. In: Information Security and Cryptology \u2013 ICISC 2020, pp. 215\u2013234. Springer, Cham","DOI":"10.1007\/978-3-030-68890-5_12"},{"issue":"6","key":"1606_CR12","doi-asserted-by":"publisher","first-page":"0287025","DOI":"10.1371\/journal.pone.0287025","volume":"18","author":"K Okada","year":"2023","unstructured":"Okada K, Endo K, Yasuoka K, Kurabayashi S (2023) Learned pseudo-random number generator: WGAN-GP for generating statistically robust random numbers. PLoS ONE 18(6):0287025. https:\/\/doi.org\/10.1371\/journal.pone.0287025","journal-title":"PLoS ONE"},{"key":"1606_CR13","doi-asserted-by":"crossref","unstructured":"Bassham\u00a0III LE, Rukhin AL, Soto J, Nechvatal JR, Smid ME, Barker EB, Leigh SD, Levenson M, Vangel M, Banks DL, et al (2010) Sp 800-22 rev. 1a. a statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards & Technology","DOI":"10.6028\/NIST.SP.800-22r1a"},{"key":"1606_CR14","doi-asserted-by":"crossref","unstructured":"Wu X, Han Y, Zhu S, Li Y, Cui S, Wang X (2023) Learned pseudo-random number generator based on generative adversarial networks. In: International Conference on Frontiers in Cyber Security, pp. 517\u2013530. Springer","DOI":"10.1007\/978-981-99-9331-4_34"},{"key":"1606_CR15","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-642-61068-4_7","volume":"2","author":"R Rojas","year":"1996","unstructured":"Rojas R, Rojas R (1996) The backpropagation algorithm. Neural Netw 2:149\u2013182","journal-title":"Neural Netw"},{"issue":"1","key":"1606_CR16","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1038\/scientificamerican0792-66","volume":"267","author":"JH Holland","year":"1992","unstructured":"Holland JH (1992) Genetic algorithms. Sci Am 267(1):66\u201373","journal-title":"Sci Am"},{"key":"1606_CR17","unstructured":"Randomness test specification. China Standard Press (2021)"},{"key":"1606_CR18","doi-asserted-by":"crossref","unstructured":"Bi R, Xu T, Xu M, Chen E (2022) Paddlepaddle: A production-oriented deep learning platform facilitating the competency of enterprises. In: 2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC\/DSS\/SmartCity\/DependSys), pp. 92\u201399. IEEE","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys57074.2022.00046"},{"key":"1606_CR19","unstructured":"Mirza M, Osindero S (2014) Conditional generative adversarial nets arXiv:1411.1784"},{"key":"1606_CR20","unstructured":"Radford A, Metz L, Chintala S (2015) Unsupervised representation learning with deep convolutional generative adversarial networks arXiv:1511.06434"},{"key":"1606_CR21","unstructured":"Chen X, Duan Y, Houthooft R, Schulman J, Sutskever I, Abbeel P (2016) InfoGAN: Interpretable representation learning by information maximizing generative adversarial nets arXiv:1606.03657"},{"key":"1606_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1609\/aaai.v31i1.10804","volume":"31","author":"L Yu","year":"2017","unstructured":"Yu L, Zhang W, Wang J, Yu Y (2017) SeqGAN: Sequence generative adversarial nets with policy gradient. Proc Conf AAAI Artif Intell 31:1. https:\/\/doi.org\/10.1609\/aaai.v31i1.10804","journal-title":"Proc Conf AAAI Artif Intell"},{"issue":"5","key":"1606_CR23","doi-asserted-by":"publisher","first-page":"1404","DOI":"10.1002\/wics.1404","volume":"9","author":"L-Y Deng","year":"2017","unstructured":"Deng L-Y, Bowman D (2017) Developments in pseudo-random number generators: pseudo-random number generators. Wiley Interdiscip Rev Comput Stat 9(5):1404. https:\/\/doi.org\/10.1002\/wics.1404","journal-title":"Wiley Interdiscip Rev Comput Stat"},{"key":"1606_CR24","unstructured":"Gulrajani I, Ahmed F, Arjovsky M, Dumoulin V, Courville A (2017) Improved training of wasserstein GANs arXiv:1704.00028"},{"key":"1606_CR25","doi-asserted-by":"crossref","unstructured":"Vikhar PA (2016) Evolutionary algorithms: a critical review and its future prospects. In: 2016 International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC), pp. 261\u2013265. IEEE","DOI":"10.1109\/ICGTSPICC.2016.7955308"},{"issue":"4","key":"1606_CR26","doi-asserted-by":"publisher","first-page":"1242","DOI":"10.1109\/TNNLS.2019.2919608","volume":"31","author":"Y Sun","year":"2020","unstructured":"Sun Y, Xue B, Zhang M, Yen GG (2020) Completely automated CNN architecture design based on blocks. IEEE Trans Neural Netw Learn Syst 31(4):1242\u20131254","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"1606_CR27","doi-asserted-by":"crossref","unstructured":"Viswambaran RA, Chen G, Xue B, Nekooei M (2019) Evolutionary design of recurrent neural network architecture for human activity recognition. In: 2019 IEEE Congress on Evolutionary Computation (CEC), pp. 554\u2013561. IEEE","DOI":"10.1109\/CEC.2019.8790050"},{"key":"1606_CR28","doi-asserted-by":"crossref","unstructured":"Paulin C, Selouani S-A, Hervet \u00c9 (2016) Speech steganalysis using evolutionary restricted boltzmann machines. In: 2016 IEEE Congress on Evolutionary Computation (CEC), pp. 4831\u20134838. IEEE","DOI":"10.1109\/CEC.2016.7744409"},{"issue":"10","key":"1606_CR29","doi-asserted-by":"publisher","first-page":"4454","DOI":"10.1109\/TCYB.2019.2937565","volume":"50","author":"X Zhang","year":"2020","unstructured":"Zhang X, Du K-J, Zhan Z-H, Kwong S, Gu T-L, Zhang J (2020) Cooperative coevolutionary bare-bones particle swarm optimization with function independent decomposition for large-scale supply chain network design with uncertainties. IEEE Trans Cybern 50(10):4454\u20134468","journal-title":"IEEE Trans Cybern"},{"issue":"6","key":"1606_CR30","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1109\/TEVC.2019.2895748","volume":"23","author":"C Wang","year":"2019","unstructured":"Wang C, Xu C, Yao X, Tao D (2019) Evolutionary generative adversarial networks. IEEE Trans Evol Comput 23(6):921\u2013934","journal-title":"IEEE Trans Evol Comput"},{"issue":"5","key":"1606_CR31","doi-asserted-by":"publisher","first-page":"856","DOI":"10.1109\/TEVC.2021.3066285","volume":"25","author":"F Huang","year":"2021","unstructured":"Huang F, Jolfaei A, Bashir AK (2021) Robust multimodal representation learning with evolutionary adversarial attention networks. IEEE Trans Evol Comput 25(5):856\u2013868","journal-title":"IEEE Trans Evol Comput"},{"issue":"5","key":"1606_CR32","doi-asserted-by":"publisher","first-page":"986","DOI":"10.1109\/TEVC.2021.3068842","volume":"25","author":"S Chen","year":"2021","unstructured":"Chen S, Wang W, Xia B, You X, Peng Q, Cao Z, Ding W (2021) CDE-GAN: Cooperative dual evolution-based generative adversarial network. IEEE Trans Evol Comput 25(5):986\u20131000","journal-title":"IEEE Trans Evol Comput"},{"key":"1606_CR33","first-page":"1","volume":"2","author":"S Chen","year":"2024","unstructured":"Chen S, Chen S, Hou W, Ding W, You X (2024) EGANS: Evolutionary generative adversarial network search for zero-shot learning. IEEE Trans Evol Comput 2:1","journal-title":"IEEE Trans Evol Comput"},{"key":"1606_CR34","volume-title":"Foundations of cryptography: basic tools","author":"O Goldreich","year":"2009","unstructured":"Goldreich O (2009) Foundations of cryptography: basic tools, vol 1. Cambridge University Press, Cambridge"},{"key":"1606_CR35","unstructured":"Hendrycks D, Gimpel K (2016) Gaussian error linear units (GELUs) arXiv:1606.08415"},{"issue":"6","key":"1606_CR36","doi-asserted-by":"publisher","first-page":"2193","DOI":"10.1016\/j.physa.2011.12.004","volume":"391","author":"A Lipowski","year":"2012","unstructured":"Lipowski A, Lipowska D (2012) Roulette-wheel selection via stochastic acceptance. Phys A 391(6):2193\u20132196","journal-title":"Phys A"},{"key":"1606_CR37","doi-asserted-by":"crossref","unstructured":"Gupte A, Vafa N, Vaikuntanathan V (2022) Continuous LWE is as hard as LWE & applications to learning gaussian mixtures. In: 2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS). IEEE,","DOI":"10.1109\/FOCS54457.2022.00112"},{"issue":"16\u201318","key":"1606_CR38","doi-asserted-by":"publisher","first-page":"2346","DOI":"10.1016\/j.neucom.2006.04.003","volume":"69","author":"S Lian","year":"2006","unstructured":"Lian S, Sun J, Wang Z (2006) Secure hash function based on neural network. Neurocomputing 69(16\u201318):2346\u20132350. https:\/\/doi.org\/10.1016\/j.neucom.2006.04.003","journal-title":"Neurocomputing"},{"key":"1606_CR39","volume-title":"Real-world Cryptography","author":"D Wong","year":"2021","unstructured":"Wong D (2021) Real-world Cryptography. Simon and Schuster"},{"key":"1606_CR40","doi-asserted-by":"crossref","unstructured":"Barker EB, Kelsey JM (2012) Sp 800-90a. recommendation for random number generation using deterministic random bit generators. National Institute of Standards & Technology","DOI":"10.6028\/NIST.SP.800-90a"},{"key":"1606_CR41","doi-asserted-by":"crossref","unstructured":"Lloyd S, Weedbrook C (2018) Quantum generative adversarial learning. Phys Rev Lett 121:4","DOI":"10.1103\/PhysRevLett.121.040502"},{"issue":"116891","key":"1606_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2022.116891","volume":"110","author":"N-R Zhou","year":"2023","unstructured":"Zhou N-R, Zhang T-F, Xie X-W, Wu J-Y (2023) Hybrid quantum-classical generative adversarial networks for image generation via learning discrete distribution. Signal Process Image Commun 110(116891):116891","journal-title":"Signal Process Image Commun"},{"issue":"129993","key":"1606_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2023.129993","volume":"550","author":"L-H Gong","year":"2024","unstructured":"Gong L-H, Pei J-J, Zhang T-F, Zhou N-R (2024) Quantum convolutional neural network based on variational quantum circuits. Opt Commun 550(129993):129993","journal-title":"Opt Commun"},{"key":"1606_CR44","doi-asserted-by":"crossref","unstructured":"Gong L-H, Ding W, Li Z, Wang Y-Z, Zhou N-R (2024) Quantum k-nearest neighbor classification algorithm via a divide-and-conquer strategy. Adv Quant Technol 7:6","DOI":"10.1002\/qute.202300221"},{"key":"1606_CR45","doi-asserted-by":"crossref","unstructured":"Gong C, Zhou N, Xia S, Huang S (2024) Quantum particle swarm optimization algorithm based on diversity migration strategy. Fut Gen Comput Syst 157:445\u2013458","DOI":"10.1016\/j.future.2024.04.008"},{"key":"1606_CR46","doi-asserted-by":"crossref","unstructured":"Gilbert H, Robshaw MJ, Seurin Y (2008) How to encrypt with the lpn problem. In: Automata, Languages and Programming: 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II 35, pp. 679\u2013690. Springer","DOI":"10.1007\/978-3-540-70583-3_55"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01606-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-024-01606-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01606-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T20:20:07Z","timestamp":1738268407000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-024-01606-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,13]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1606"],"URL":"https:\/\/doi.org\/10.1007\/s40747-024-01606-w","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,13]]},"assertion":[{"value":"28 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"31"}}