{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T19:35:44Z","timestamp":1775158544307,"version":"3.50.1"},"reference-count":73,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T00:00:00Z","timestamp":1718236800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T00:00:00Z","timestamp":1718236800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Comput Intell Syst"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Recently, the field of lightweight cryptography (LWC) has emerged in response to the security needs of low-cost, widely used technology. It is essential to implement an encryption approach with access control to give less complex, more flexible, and safe access to sensitive data. In this work, a novel lightweight chaotic encryption approach with fuzzy access control is presented to encrypt light images in the IoT domain, while maintaining image quality. With the aid of multiplexer modeling and information shift register technology, the algorithm\u2019s design combines random and chaotic mapping approach based on a specific password key with a predetermined number of fuzzy logic shifts on the password key for the image pixels. Further, to extract the private key with complexity and boost defense against attacks, a shift register and logical xor combination is employed. The simulation of the proposed model for AVR microcontroller has been done under MATLAB software and the design of various encryption components has been used to implement lightweight mapping. The proposed system has been evaluated in terms of histogram analysis, adjacent pixel correlation analysis, contrast analysis, homogeneity analysis, energy analysis, NIST analysis, error mean square analysis, information entropy, pixel number change rate, integrated mean change intensity, peak signal-to-noise ratio, and time complexity. Remarkably, the proposed technique has demonstrated high efficiency. The simulation results show that the homogeneity, energy, contrast, NPCR, and UACI criteria have improved by 11.5%, 13.1%, 19%, 0.53%, and 0.12%, respectively, compared to other methods in other articles.<\/jats:p>","DOI":"10.1007\/s44196-024-00535-3","type":"journal-article","created":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T10:02:59Z","timestamp":1718272979000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Lightweight Image Encryption Using a Novel Chaotic Technique for the Safe Internet of Things"],"prefix":"10.1007","volume":"17","author":[{"given":"Ali Mohammad Norouzzadeh","family":"Gilmolk","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9748-3828","authenticated-orcid":false,"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,13]]},"reference":[{"key":"535_CR1","doi-asserted-by":"crossref","unstructured":"Weddell, A. S., Magno, M.: In 2018 International symposium on power electronics, electrical drives, automation and motion (SPEEDAM). 111\u2013117 (IEEE)","DOI":"10.1109\/SPEEDAM.2018.8445323"},{"key":"535_CR2","doi-asserted-by":"publisher","first-page":"1247","DOI":"10.1007\/s10207-022-00609-3","volume":"21","author":"A Kifouche","year":"2022","unstructured":"Kifouche, A., Azzaz, M.S., Hamouche, R., Kocik, R.: Design and implementation of a new lightweight chaos-based cryptosystem to secure IoT communications. Int. J. Inf. Secur. 21, 1247\u20131262 (2022)","journal-title":"Int. J. Inf. Secur."},{"key":"535_CR3","doi-asserted-by":"crossref","unstructured":"Singh, S., Sharma, P.K., Moon, S.Y., Park, J.H.: Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J. Ambient Intell. Humaniz. Comput., 1\u201318 (2017)","DOI":"10.1007\/s12652-017-0494-4"},{"key":"535_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102448","volume":"115","author":"OA Khashan","year":"2021","unstructured":"Khashan, O.A., Ahmad, R., Khafajah, N.M.: An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks. Ad Hoc Netw. 115, 102448 (2021)","journal-title":"Ad Hoc Netw."},{"key":"535_CR5","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.vlsi.2022.11.004","volume":"89","author":"M Trik","year":"2023","unstructured":"Trik, M., Akhavan, H., Bidgoli, A.M., Molk, A.M.N.G., Vashani, H., Mozaffari, S.P.: A new adaptive selection strategy for reducing latency in networks on chip. Integration. 89, 9\u201324 (2023)","journal-title":"Integration."},{"key":"535_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109327","volume":"217","author":"S Kumari","year":"2022","unstructured":"Kumari, S., Singh, M., Singh, R., Tewari, H.: A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices. Comput. Netw. 217, 109327 (2022)","journal-title":"Comput. Netw."},{"key":"535_CR7","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.gltp.2021.01.014","volume":"2","author":"F Thabit","year":"2021","unstructured":"Thabit, F., Alhomdy, S., Jagtap, S.: Security analysis and performance evaluation of a new lightweight cryptographic algorithm for cloud computing. Glob. Transit. Proc. 2, 100\u2013110 (2021)","journal-title":"Glob. Transit. Proc."},{"key":"535_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08584-z","author":"F Masood","year":"2021","unstructured":"Masood, F., et al.: A lightweight chaos-based medical image encryption scheme using random shuffling and XOR operations. Wirel. Pers. Commun. (2021). https:\/\/doi.org\/10.1007\/s11277-021-08584-z","journal-title":"Wirel. Pers. Commun."},{"key":"535_CR9","doi-asserted-by":"publisher","first-page":"11935","DOI":"10.3934\/mbe.2022556","volume":"19","author":"Z Yang","year":"2022","unstructured":"Yang, Z., et al.: Lightweight blockchain fuzzy decision scheme through MQTT and Fibonacci for sustainable transport. Math. Biosci. Eng. 19, 11935\u201311956 (2022)","journal-title":"Math. Biosci. Eng."},{"key":"535_CR10","doi-asserted-by":"publisher","DOI":"10.1145\/3511603","author":"J Li","year":"2023","unstructured":"Li, J., Han, L., Zhang, C., Li, Q., Liu, Z. (2023). Spherical Convolution Empowered Viewport Prediction in 360 Video Multicast with Limited FoV Feedback. ACM Trans. Multimedia Comput. Commun. Appl. https:\/\/doi.org\/10.1145\/3511603","journal-title":"Multimedia Comput. Commun. Appl."},{"key":"535_CR11","doi-asserted-by":"crossref","unstructured":"Usman, M., Ahmed, I., Aslam, M.I., Khan, S., Shah, U.A.: SIT: a lightweight encryption algorithm for secure internet of things. arXiv preprint arXiv:1704.08688 (2017)","DOI":"10.14569\/IJACSA.2017.080151"},{"key":"535_CR12","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1007\/s00521-016-2405-6","volume":"28","author":"J Ahmad","year":"2017","unstructured":"Ahmad, J., Khan, M.A., Hwang, S.O., Khan, J.S.: A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices. Neural Comput. Appl. 28, 953\u2013967 (2017)","journal-title":"Neural Comput. Appl."},{"key":"535_CR13","doi-asserted-by":"crossref","unstructured":"Khan, F.A., Ahmed, J., Khan, J.S., Ahmad, J., Khan, M.A.: In 2017 International conference on circuits, system and simulation (ICCSS). 32\u201336 (IEEE)","DOI":"10.1109\/CIRSYSSIM.2017.8023176"},{"key":"535_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2023.127515","volume":"276","author":"T Hai","year":"2023","unstructured":"Hai, T., Kadir, D.H., Ghanbari, A.: Modeling the emission characteristics of the hydrogen-enriched natural gas engines by multi-output least-squares support vector regression: comprehensive statistical and operating analyses. Energy 276, 127515 (2023)","journal-title":"Energy"},{"key":"535_CR15","doi-asserted-by":"publisher","first-page":"2939","DOI":"10.1109\/TMM.2022.3153208","volume":"25","author":"J Li","year":"2023","unstructured":"Li, J., Zhang, C., Liu, Z., Hong, R., Hu, H. Optimal Volumetric Video Streaming With Hybrid Saliency Based Tiling. IEEE Trans. Multimedia, 25, 2939\u20132953 (2023). https:\/\/doi.org\/10.1109\/TMM.2022.3153208","journal-title":"IEEE Trans. Multimedia"},{"issue":"12","key":"535_CR16","doi-asserted-by":"publisher","first-page":"8436","DOI":"10.1109\/TCSVT.2022.3194169","volume":"32","author":"D Cheng","year":"2022","unstructured":"Cheng, D., Chen, L., Lv, C., Guo, L., Kou, Q. Light-Guided and Cross-Fusion U-Net for Anti-Illumination Image Super-Resolution. IEEE Transactions on Circuits and Systems for Video Technology, 32(12), 8436\u20138449 (2022). https:\/\/doi.org\/10.1109\/TCSVT.2022.3194169","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"3","key":"535_CR17","doi-asserted-by":"publisher","first-page":"1564","DOI":"10.1109\/TCSVT.2021.3069838","volume":"32","author":"H Liu","year":"2022","unstructured":"Liu, H., Yuan, H., Liu, Q., Hou, J., Zeng, H., Kwong, S. A Hybrid Compression Framework for Color Attributes of Static 3D Point Clouds. IEEE Transactions on Circuits and Systems for Video Technology, 32(3), 1564\u20131577 (2022). https:\/\/doi.org\/10.1109\/TCSVT.2021.3069838","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"535_CR18","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3676","volume":"33","author":"A Adeel","year":"2022","unstructured":"Adeel, A., et al.: A multi-attack resilient lightweight IoT authentication scheme. Trans. Emerg. Telecommun. Technol. 33, e3676 (2022)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"535_CR19","doi-asserted-by":"publisher","first-page":"103731","DOI":"10.1016\/j.jvcir.2022.103731","volume":"90","author":"C Fu","year":"2023","unstructured":"Fu, C., Yuan, H., Xu, H., Zhang, H., Shen, L. TMSO-Net: Texture adaptive multi-scale observation for light field image depth estimation. J. Vis. Commun. Image Represent., 90, 103731 (2023). https:\/\/doi.org\/10.1016\/j.jvcir.2022.103731","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"1","key":"535_CR20","doi-asserted-by":"publisher","first-page":"13047","DOI":"10.1117\/1.JEI.32.1.013047","volume":"32","author":"G Tian","year":"2023","unstructured":"Tian, G., Hui, Y., Lu, W., Tingting, W. Rate-distortion optimized quantization for geometry-based point cloud compression. J. Electron. Imaging, 32(1), 13047 (2023). https:\/\/doi.org\/10.1117\/1.JEI.32.1.013047","journal-title":"J. Electron. Imaging"},{"issue":"5","key":"535_CR21","doi-asserted-by":"publisher","first-page":"7576","DOI":"10.1109\/TII.2024.3363089","volume":"20","author":"W Ren","year":"2024","unstructured":"Ren, W., Jin, N., OuYang, L. Phase Space Graph Convolutional Network for Chaotic Time Series Learning. IEEE Trans. Industr. Inf., 20(5), 7576\u20137584 (2024). https:\/\/doi.org\/10.1109\/TII.2024.3363089","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"3","key":"535_CR22","doi-asserted-by":"publisher","first-page":"342","DOI":"10.14736\/kyb-2023-3-0342","volume":"59","author":"C Guo","year":"2023","unstructured":"Guo, C., Hu, J., Hao, J., \u010celikovsk\u00fd, S., Hu, X. Fixed-time safe tracking control of uncertain high-order nonlinear pure-feedback systems via unified transformation functions. Kybernetika, 59(3), 342\u2013364 (2023). https:\/\/doi.org\/10.14736\/kyb-2023-3-0342","journal-title":"Kybernetika"},{"key":"535_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3380068","author":"Y Liu","year":"2024","unstructured":"Liu, Y., Zhao, B., Zhao, Z., Liu, J., Lin, X., Wu, Q., Susilo, W. SS-DID: A Secure and Scalable Web3 Decentralized Identity Utilizing Multi-Layer Sharding Blockchain. IEEE Internet Things J., (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3380068","journal-title":"IEEE Internet Things J."},{"key":"535_CR24","doi-asserted-by":"publisher","first-page":"102173","DOI":"10.1016\/j.inffus.2023.102173","volume":"104","author":"B Jiang","year":"2024","unstructured":"Jiang, B., Zhao, Y., Dong, J., & Hu, J. Analysis of the influence of trust in opposing opinions: an inclusiveness-degree based Signed Deffuant\u2013Weisbush model. Inf. Fusion, 104, 102173 (2024). https:\/\/doi.org\/10.1016\/j.inffus.2023.102173","journal-title":"Inf. Fusion"},{"issue":"11","key":"535_CR25","doi-asserted-by":"publisher","first-page":"13666","DOI":"10.1109\/TPAMI.2023.3296163","volume":"45","author":"Y Shi","year":"2023","unstructured":"Shi, Y., Xi, J., Hu, D., Cai, Z., Xu, K. RayMVSNet++: learning ray-based 1D implicit fields for accurate multi-view stereo. IEEE Trans. Pattern Anal. Mach. Intell., 45(11), 13666\u201313682 (2023). https:\/\/doi.org\/10.1109\/TPAMI.2023.3296163","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"8","key":"535_CR26","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.001.2200809","volume":"61","author":"Y Liu","year":"2023","unstructured":"Liu, Y., Fang, Z., Cheung, M. H., Cai, W., Huang, J. Mechanism design for blockchain storage sustainability. IEEE Commun. Mag., 61(8), 102\u2013107 (2023). https:\/\/doi.org\/10.1109\/MCOM.001.2200809","journal-title":"IEEE Commun. Mag."},{"key":"535_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3339674","author":"M Li","year":"2023","unstructured":"Li, M., Cui, H., Liu, C., Shan, C., Du, X., Guizani, M. A four-dimensional space-based data multi-embedding mechanism for network services. IEEE Trans. Netw. Serv. Manage. (2023). https:\/\/doi.org\/10.1109\/TNSM.2023.3339674","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"535_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3375369","author":"W Li","year":"2024","unstructured":"Li, W., Susilo, W., Xia, C., Huang, L., Guo, F., Wang, T. Secure data integrity check based on verified public key encryption with equality test for multi-cloud storage. IEEE Trans. Dependable Secure Comput., (2024). https:\/\/doi.org\/10.1109\/TDSC.2024.3375369","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"3","key":"535_CR29","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/s12539-023-00565-z","volume":"15","author":"X Yao","year":"2023","unstructured":"Yao, X., Xie, R., Zan, X., Su, Y., Xu, P., Liu, W. A novel image encryption scheme for DNA storage systems based on DNA hybridization and gene mutation. Interdisc. Sci.: Comput. Life Sci., 15(3), 419\u2013432 (2023). https:\/\/doi.org\/10.1007\/s12539-023-00565-z","journal-title":"Interdisc. Sci.: Comput. Life Sci."},{"issue":"2","key":"535_CR30","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1109\/TNSM.2016.2541171","volume":"13","author":"B Cheng","year":"2016","unstructured":"Cheng, B., Zhu, D., Zhao, S., Chen, J. Situation-aware IoT service coordination using the event-driven SOA paradigm. IEEE Trans. Netw. Serv. Manage., 13(2), 349\u2013361 (2016). https:\/\/doi.org\/10.1109\/TNSM.2016.2541171","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"535_CR31","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2024.3392690","author":"C Yang","year":"2024","unstructured":"Yang, C., Sheng, D., Yang, B., Zheng, W., Liu, C. A dual-domain diffusion model for sparse-view CT reconstruction. IEEE Signal Process. Lett., (2024). https:\/\/doi.org\/10.1109\/LSP.2024.3392690","journal-title":"IEEE Signal Process. Lett."},{"key":"535_CR32","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1755","author":"W Zheng","year":"2024","unstructured":"Zheng, W., Lu, S., Yang, Y., Yin, Z., Yin, L., Ali, H. (2024). Lightweight transformer image feature extraction network. PeerJ Comput. Sci., 10, e1755. https:\/\/doi.org\/10.7717\/peerj-cs.1755","journal-title":"PeerJ Comput. Sci."},{"issue":"24","key":"535_CR33","doi-asserted-by":"publisher","first-page":"4895","DOI":"10.3390\/electronics12244895","volume":"12","author":"MA Fetteha","year":"2023","unstructured":"Fetteha, M.A., Sayed, W.S., Said, L.A.: A lightweight image encryption scheme using DNA coding and chaos. Electronics 12(24), 4895 (2023)","journal-title":"Electronics"},{"issue":"5","key":"535_CR34","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.1080\/01969722.2022.2129375","volume":"55","author":"J Sun","year":"2024","unstructured":"Sun, J., Zhang, Y., Trik, M. PBPHS: a profile-based predictive handover strategy for 5G networks. Cybern. Syst., 55(5), 1041\u20131062 (2024)","journal-title":"Cybern. Syst."},{"issue":"9","key":"535_CR35","first-page":"101732","volume":"35","author":"Z Wang","year":"2023","unstructured":"Wang, Z., Jin, Z., Yang, Z., Zhao, W., Trik, M. Increasing efficiency for routing in internet of things using binary gray wolf optimization and fuzzy logic. J King Saud Univ.-Comput. Inf. Sci., 35(9), 101732 (2023)","journal-title":"J King Saud Univ.-Comput. Inf. Sci."},{"key":"535_CR36","doi-asserted-by":"publisher","first-page":"101780","DOI":"10.1016\/j.rineng.2024.101780","volume":"21","author":"E Khezri","year":"2024","unstructured":"Khezri, E., Yahya, R. O., Hassanzadeh, H., Mohaidat, M., Ahmadi, S., Trik, M. DLJSF: data-locality aware job scheduling IoT tasks in fog-cloud computing environments. Results Eng., 21, 101780 (2024)","journal-title":"Results Eng."},{"key":"535_CR37","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.aej.2024.04.063","volume":"99","author":"L Zhang","year":"2024","unstructured":"Zhang, L., Hu, S., Trik, M., Liang, S., Li, D. M2M communication performance for a noisy channel based on latency-aware source-based LTE network measurements. Alexandria Eng. J., 99, 47\u201363 (2024)","journal-title":"Alexandria Eng. J."},{"key":"535_CR38","doi-asserted-by":"crossref","unstructured":"Trik, M., Molk, A. M. N. G., Ghasemi, F., Pouryeganeh, P. A hybrid selection strategy based on traffic analysis for improving performance in networks on chip. J.Sens., 2022. (2022).","DOI":"10.1155\/2022\/3112170"},{"key":"535_CR39","doi-asserted-by":"publisher","first-page":"16823","DOI":"10.1021\/acs.est.3c04956","volume":"57","author":"B Xue","year":"2023","unstructured":"Xue, B., et al.: Genotoxicity assessment of haloacetaldehyde disinfection byproducts via a simplified yeast-based toxicogenomics assay. Environ. Sci. Technol. 57, 16823\u201316833 (2023). https:\/\/doi.org\/10.1021\/acs.est.3c04956","journal-title":"Environ. Sci. Technol."},{"issue":"5","key":"535_CR40","doi-asserted-by":"publisher","first-page":"473","DOI":"10.2174\/1574893617666220404145517","volume":"17","author":"H Zhang","year":"2022","unstructured":"Zhang, H., Zou, Q., Ju, Y., Song, C., Chen, D.: Distance-based support vector machine to predict DNA N6-methyladine modification. Curr. Bioinform. 17(5), 473\u2013482 (2022)","journal-title":"Curr. Bioinform."},{"issue":"D1","key":"535_CR41","doi-asserted-by":"publisher","first-page":"D1123","DOI":"10.1093\/nar\/gkab957","volume":"50","author":"C Cao","year":"2022","unstructured":"Cao, C., Wang, J., Kwok, D., Cui, F., Zhang, Z., Zhao, D., Zou, Q.: webTWAS: a resource for disease candidate susceptibility genes identified by transcriptome-wide association study. Nucleic Acids Res. 50(D1), D1123\u2013D1130 (2022)","journal-title":"Nucleic Acids Res."},{"key":"535_CR42","first-page":"200332","volume":"21","author":"MY Saidabad","year":"2024","unstructured":"Saidabad, M. Y., Hassanzadeh, H., Ebrahimi, S. H. S., Khezri, E., Rahimi, M. R., Trik, M. An efficient approach for multi-label classification based on Advanced Kernel-Based Learning System. Intell. Syst. Appl., 21, 200332 (2024)","journal-title":"Intell. Syst. Appl."},{"key":"535_CR43","doi-asserted-by":"publisher","first-page":"4010","DOI":"10.1109\/TFUZZ.2023.3273566","volume":"31","author":"H Zhao","year":"2023","unstructured":"Zhao, H., et al.: Hierarchical sliding-mode surface-based adaptive critic tracking control for nonlinear multiplayer zero-sum games via generalized fuzzy hyperbolic models. IEEE Trans. Fuzzy Syst. 31, 4010\u20134023 (2023). https:\/\/doi.org\/10.1109\/TFUZZ.2023.3273566","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"535_CR44","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2023.3317902","author":"H Zhao","year":"2023","unstructured":"Zhao, H., Zong, G., Wang, H., Zhao, X., Xu, N.: Zero-sum game-based hierarchical sliding-mode fault-tolerant tracking control for interconnected nonlinear systems via adaptive critic design. IEEE Trans. Autom. Sci. Eng. (2023). https:\/\/doi.org\/10.1109\/TASE.2023.3317902","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"535_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2023.108735","volume":"474","author":"H Zhao","year":"2024","unstructured":"Zhao, H., Wang, H., Niu, B., Zhao, X., Xu, N.: Adaptive fuzzy decentralized optimal control for interconnected nonlinear systems with unmodeled dynamics via mixed data and event driven method. Fuzzy Sets Syst. 474, 108735 (2024)","journal-title":"Fuzzy Sets Syst."},{"key":"535_CR46","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2023.3318525","author":"Y Zhao","year":"2023","unstructured":"Zhao, Y., Liang, H., Zong, G., Wang, H.: Event-based distributed finite-horizon $ H_\\infty $ consensus control for constrained nonlinear multiagent systems. IEEE Syst. J. (2023). https:\/\/doi.org\/10.1109\/JSYST.2023.3318525","journal-title":"IEEE Syst. J."},{"key":"535_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2023.107689","volume":"129","author":"F Cheng","year":"2024","unstructured":"Cheng, F., Niu, B., Xu, N., Zhao, X.: Resilient distributed secure consensus control for uncertain networked agent systems under hybrid DoS attacks. Commun. Nonlinear Sci. Numer. Simul. 129, 107689 (2024)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"535_CR48","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2023.114367","volume":"178","author":"S Liu","year":"2024","unstructured":"Liu, S., Niu, B., Karimi, H.R., Zhao, X.: Self-triggered fixed-time bipartite fault-tolerant consensus for nonlinear multiagent systems with function constraints on states. Chaos Solitons Fractals 178, 114367 (2024)","journal-title":"Chaos Solitons Fractals"},{"key":"535_CR49","doi-asserted-by":"crossref","unstructured":"Li, Y., Wang, H., Trik, M. Design and simulation of a new current mirror circuit with low power consumption and high performance and output impedance. Analog Integrated Circuits and Signal Processing, 1\u201313 (2024)","DOI":"10.1007\/s10470-023-02243-y"},{"key":"535_CR50","unstructured":"Zoraghchian, A. A., Asghari, A., Trik, M. Thermal control methods for reducing heat in 3D ICs-TSV (Through-Silicon-Via). (2014)"},{"issue":"1","key":"535_CR51","first-page":"10","volume":"3","author":"B HassanVandi","year":"2021","unstructured":"HassanVandi, B., Kurdi, R., & Trik, M. Applying a modified triple modular redundancy mechanism to enhance the reliability in software-defined network. Mapta Journal of Electrical and Computer Engineering (MJECE), 3(1), 10\u201316. (2021)","journal-title":"Mapta Journal of Electrical and Computer Engineering (MJECE)"},{"key":"535_CR52","doi-asserted-by":"crossref","unstructured":"Koo, W. K., Lee, H., Kim, Y. H., Lee, D.H.: Implementation and analysis of new lightweight cryptographic algorithm suitable for wireless sensor networks. In 2008 International Conference on Information Security and Assurance (isa 2008) (pp. 73\u201376). IEEE (2008)","DOI":"10.1109\/ISA.2008.53"},{"key":"535_CR53","doi-asserted-by":"publisher","DOI":"10.1063\/5.0165575","author":"H Hu","year":"2023","unstructured":"Hu, H., Luo, P., Kadir, D.H., Hassanvand, A.: Assessing the impact of aneurysm morphology on the risk of internal carotid artery aneurysm rupture: a statistical and computational analysis of endovascular coiling. Phys. Fluids. (2023). https:\/\/doi.org\/10.1063\/5.0165575","journal-title":"Phys. Fluids."},{"key":"535_CR54","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1371\/journal.pone.0282031","volume":"18","author":"E Khezri","year":"2023","unstructured":"Khezri, E., Zeinali, E., Sargolzaey, H. SGHRP: Secure Greedy Highway Routing Protocol with authentication and increased privacy in vehicular ad hoc networks. Plos one, 18(4), e0282031. (2023)","journal-title":"Plos one"},{"issue":"1","key":"535_CR55","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1186\/s13677-023-00552-1","volume":"12","author":"L Xiao","year":"2023","unstructured":"Xiao, L., Cao, Y., Gai, Y., Khezri, E., Liu, J., Yang, M. Recognizing sports activities from video frames using deformable convolution and adaptive multiscale features. J Cloud Comput., 12(1), 167 (2023)","journal-title":"J Cloud Comput."},{"key":"535_CR56","doi-asserted-by":"crossref","unstructured":"Fakhri, P.S. et al.: A fuzzy decision-making system for video tracking with multiple objects in non-stationary conditions. Heliyon 9 (2023)","DOI":"10.1016\/j.heliyon.2023.e22156"},{"key":"535_CR57","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/s11071-015-2008-2","volume":"81","author":"SM Seyedzadeh","year":"2015","unstructured":"Seyedzadeh, S.M., Norouzi, B., Mosavi, M.R., Mirzakuchaki, S.: A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dyn. 81, 511\u2013529 (2015)","journal-title":"Nonlinear Dyn."},{"issue":"12","key":"535_CR58","doi-asserted-by":"publisher","first-page":"913","DOI":"10.3390\/e20120913","volume":"20","author":"I Younas","year":"2018","unstructured":"Younas, I., Khan, M.: A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy 20(12), 913 (2018)","journal-title":"Entropy"},{"key":"535_CR59","doi-asserted-by":"crossref","unstructured":"Ding, X., Yao, R., Khezri, E. An efficient algorithm for optimal route node sensing in smart tourism Urban traffic based on priority constraints. Wirel. Networks, 1\u201318. (2023)","DOI":"10.21203\/rs.3.rs-3276051\/v1"},{"issue":"3","key":"535_CR60","doi-asserted-by":"publisher","first-page":"426","DOI":"10.14736\/kyb-2022-3-0426","volume":"58","author":"J Ma","year":"2022","unstructured":"Ma, J., Hu, J. Safe consensus control of cooperative-competitive multi-agent systems via differential privacy. Kybernetika, 58(3), 426\u2013439 (2022). https:\/\/doi.org\/10.14736\/kyb-2022-3-0426","journal-title":"Kybernetika"},{"issue":"1","key":"535_CR61","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1186\/s13677-024-00601-3","volume":"13","author":"J Zhu","year":"2024","unstructured":"Zhu, J., Hu, C., Khezri, E., Ghazali, M. M. M. Edge intelligence-assisted animation design with large models: a survey. J. Cloud Comput., 13(1), 48 (2024)","journal-title":"J. Cloud Comput."},{"key":"535_CR62","doi-asserted-by":"crossref","unstructured":"Khezri, E., Zeinali, E., Sargolzaey, H. A novel highway routing protocol in vehicular ad hoc networks using VMaSC-LTE and DBA-MAC protocols. Wireless communications and mobile computing, (2022).","DOI":"10.1155\/2022\/1680507"},{"issue":"1","key":"535_CR63","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1186\/s13677-023-00520-9","volume":"12","author":"S Hedayati","year":"2023","unstructured":"Hedayati, S., Maleki, N., Olsson, T., Ahlgren, F., Seyednezhad, M., Berahmand, K. MapReduce scheduling algorithms in Hadoop: a systematic study. J. Cloud Comput., 12(1), 143 (2023)","journal-title":"J. Cloud Comput."},{"key":"535_CR64","doi-asserted-by":"crossref","unstructured":"Nasiri, E., & Wang, L. (2024). Hybrid force motion control with estimated surface normal for manufacturing applications. arXiv preprint arxiv:2404.04419","DOI":"10.1109\/UR61395.2024.10597498"},{"issue":"12","key":"535_CR65","doi-asserted-by":"publisher","first-page":"10178","DOI":"10.1109\/TNNLS.2022.3165076","volume":"34","author":"C Liu","year":"2022","unstructured":"Liu, C., Wu, T., Li, Z., Ma, T., Huang, J.: Robust online tensor completion for IoT streaming data recovery. IEEE Trans. Neural Netw. Learn. Syst. 34(12), 10178\u201310192 (2022). https:\/\/doi.org\/10.1109\/TNNLS.2022.3165076","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"535_CR66","doi-asserted-by":"publisher","first-page":"1439","DOI":"10.1007\/s11265-023-01896-2","volume":"95","author":"Z Xuemin","year":"2023","unstructured":"Xuemin, Z., et al.: Resource-constrained and socially selfish-based incentive algorithm for socially aware networks. J. Signal Process. Syst. 95, 1439\u20131453 (2023)","journal-title":"J. Signal Process. Syst."},{"key":"535_CR67","doi-asserted-by":"publisher","unstructured":"Gao, J. et al.: MetaLoc: learning to learn wireless localization. IEEE J. Sel. Areas Commun. (2023). https:\/\/doi.org\/10.48550\/arXiv.2211.04258","DOI":"10.48550\/arXiv.2211.04258"},{"key":"535_CR68","doi-asserted-by":"crossref","unstructured":"Wu, Q., Fang, J., Zeng, J., Wen, J., Luo, F.: Monte Carlo simulation-based robust workflow scheduling for spot instances in cloud environments. Singhua Sci. Technol. 29, 112\u2013126 (2023)","DOI":"10.26599\/TST.2022.9010065"},{"key":"535_CR69","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3321673","author":"T Lyu","year":"2023","unstructured":"Lyu, T., Xu, H., Zhang, L., Han, Z.: Source selection and resource allocation in wireless powered relay networks: an adaptive dynamic programming based approach. IEEE Internet Things J. (2023). https:\/\/doi.org\/10.1109\/JIOT.2023.3321673","journal-title":"IEEE Internet Things J."},{"key":"535_CR70","doi-asserted-by":"crossref","unstructured":"Wang, G., Wu, J.,Trik, M.: A novel approach to reduce video traffic based on understanding user demand and D2D communication in 5G networks. IETE J. Res., 1\u201317 (2023)","DOI":"10.1080\/03772063.2023.2278696"},{"key":"535_CR71","volume":"2024","author":"M Khosravi","year":"2024","unstructured":"Khosravi, M., Trik, M., Ansari, A.: Diagnosis and classification of disturbances in the power distribution network by phasor measurement unit based on fuzzy intelligent system. J. Eng. 2024, e12322 (2024)","journal-title":"J. Eng."},{"key":"535_CR72","doi-asserted-by":"publisher","first-page":"5091","DOI":"10.1007\/s11042-022-12169-8","volume":"82","author":"M Gupta","year":"2023","unstructured":"Gupta, M., Singh, V.P., Gupta, K.K., Shukla, P.K.: An efficient image encryption technique based on two-level security for internet of things. Multimed. Tools. Appl. 82, 5091\u20135111 (2023)","journal-title":"Multimed. Tools. Appl."},{"key":"535_CR73","volume":"25","author":"D Clemente-Lopez","year":"2024","unstructured":"Clemente-Lopez, D., de Jesus Rangel-Magdaleno, J., Mu\u00f1oz-Pacheco, J.M.: A lightweight chaos-based encryption scheme for IoT healthcare systems. IoT 25, 101032 (2024)","journal-title":"IoT"}],"container-title":["International Journal of Computational Intelligence Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44196-024-00535-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44196-024-00535-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44196-024-00535-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T19:19:22Z","timestamp":1732216762000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44196-024-00535-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,13]]},"references-count":73,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["535"],"URL":"https:\/\/doi.org\/10.1007\/s44196-024-00535-3","relation":{},"ISSN":["1875-6883"],"issn-type":[{"value":"1875-6883","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,13]]},"assertion":[{"value":"28 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 June 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests as defined by Springer, or other interests that might be perceived to influence the results and\/or discussion reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"146"}}