{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T05:24:02Z","timestamp":1772169842971,"version":"3.50.1"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2020.3046528","type":"journal-article","created":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T20:42:19Z","timestamp":1608669739000},"page":"9383-9393","source":"Crossref","is-referenced-by-count":40,"title":["Detecting the Security Level of Various Cryptosystems Using Machine Learning Models"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7495-2248","authenticated-orcid":false,"given":"Arslan","family":"Shafique","sequence":"first","affiliation":[]},{"given":"Jameel","family":"Ahmed","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2133-0757","authenticated-orcid":false,"given":"Wadii","family":"Boulila","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0537-8163","authenticated-orcid":false,"given":"Hamzah","family":"Ghandorh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6289-8248","authenticated-orcid":false,"given":"Jawad","family":"Ahmad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4228-385X","authenticated-orcid":false,"given":"Mujeeb Ur","family":"Rehman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.1016\/j.cosrev.2020.100303","article-title":"Leveraging deep learning and IoT big data analytics to support the smart cities development: Review and future directions","volume":"38","author":"atitallah","year":"2020","journal-title":"Comput Sci Rev"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2018.09.062"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICECA.2018.8474891"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2927415"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.10.020"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947855"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocn.2019.05.019"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3015556"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"623","DOI":"10.3390\/s18020623","article-title":"Personalized physical activity coaching: A machine learning approach","volume":"18","author":"dijkhuis","year":"2018","journal-title":"SENSORS"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2014.02.011"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2971759"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/iet-spr.2012.0380"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2009.89"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2976798"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3020917"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3012912"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/rs12111893"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.12.048"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2020.02.007"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1142\/S0219519415500761"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1667-5"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/e22020158"},{"key":"ref3","article-title":"Dynamic substitution based encryption algorithm for highly correlated data","author":"shafique","year":"2020","journal-title":"Multidimensional Syst Signal Process"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1984.12998"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","article-title":"A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2","volume":"83","author":"guesmi","year":"2016","journal-title":"Nonlinear Dyn"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2019.105777"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2016.0040"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(10)70006-4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/1840207"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"695","DOI":"10.1109\/TCSVT.2013.2283431","article-title":"A new secure image transmission technique via secret-fragment-visible mosaic images by nearly reversible color transformations","volume":"24","author":"lee","year":"2014","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref1","first-page":"317","article-title":"Image encryption based on Chebyshev chaotic map and S8 S-boxes","volume":"49","author":"hussain","year":"2019","journal-title":"Optica Applicata"},{"key":"ref20","first-page":"48","article-title":"PWLCM based image encryption through compressive sensing","author":"george","year":"2013","journal-title":"Proc IEEE Recent Adv Intell Comput Syst (RAICS)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2019.03.026"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11045-018-0589-x"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1140\/epjp\/i2018-12138-3"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/sym11020140"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1140\/epjp\/s13360-020-00187-0"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2006.02.021"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09303359.pdf?arnumber=9303359","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T08:31:44Z","timestamp":1643185904000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9303359\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3046528","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}