{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T02:14:41Z","timestamp":1774404881982,"version":"3.50.1"},"reference-count":336,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science (JSPS) Grant-in-Aid for Challenging Exploratory Research","doi-asserted-by":"publisher","award":["JP22534665"],"award-info":[{"award-number":["JP22534665"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002241","name":"Japan Science and Technology Agency (JST) Strategic Basic Research Promotion Program (Advanced Integrated Intelligence Platform","doi-asserted-by":"publisher","award":["22584686"],"award-info":[{"award-number":["22584686"]}],"id":[{"id":"10.13039\/501100002241","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001691","name":"JSPS Research on Academic Transformation Areas","doi-asserted-by":"publisher","award":["22572551"],"award-info":[{"award-number":["22572551"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002241","name":"JST Support for Pioneering Research Initiated by the Next Generation","doi-asserted-by":"publisher","award":["JPMJSP2136"],"award-info":[{"award-number":["JPMJSP2136"]}],"id":[{"id":"10.13039\/501100002241","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3299296","type":"journal-article","created":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T17:47:40Z","timestamp":1690480060000},"page":"81033-81070","source":"Crossref","is-referenced-by-count":47,"title":["A Survey on Reservoir Computing and its Interdisciplinary Applications Beyond Traditional Machine Learning"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4915-0301","authenticated-orcid":false,"given":"Heng","family":"Zhang","sequence":"first","affiliation":[{"name":"Department of Information Science and Technology, Kyushu University, Fukuoka, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7442-1279","authenticated-orcid":false,"given":"Danilo Vasconcellos","family":"Vargas","sequence":"additional","affiliation":[{"name":"Department of Information Science and Technology, Kyushu University, Fukuoka, Japan"}]}],"member":"263","reference":[{"key":"ref328","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3119543"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0037372"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1063\/5.0024890"},{"key":"ref329","doi-asserted-by":"publisher","DOI":"10.1038\/nrn1686"},{"key":"ref56","first-page":"1","article-title":"Phoneme recognition with large hierarchical reservoirs","volume":"23","author":"triefenbach","year":"2010","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-021-25801-2"},{"key":"ref326","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3085165"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0191527"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2899649"},{"key":"ref327","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3120472"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1038\/nn.3405"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1016\/j.physd.2021.132882"},{"key":"ref324","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3090503"},{"key":"ref53","first-page":"1","article-title":"Adaptive nonlinear system identification with Echo State Networks","volume":"15","author":"jaeger","year":"2002","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-71673-9"},{"key":"ref325","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3095140"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2017.01.049"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1687-6_19"},{"key":"ref322","doi-asserted-by":"publisher","DOI":"10.1063\/5.0138661"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2021.06.031"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevApplied.8.024030"},{"key":"ref323","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3085504"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1126\/science.1091277"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevApplied.11.034021"},{"key":"ref209","article-title":"Reservoir computing models for patient-adaptable ECG monitoring in wearable devices","author":"hadaeghi","year":"2019","journal-title":"arXiv 1907 09504"},{"key":"ref331","doi-asserted-by":"publisher","DOI":"10.1016\/j.conb.2021.08.002"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.3390\/app9040702"},{"key":"ref332","article-title":"Methods for estimating the computational power and generalization capability of neural microcircuits","volume":"17","author":"maass","year":"2004","journal-title":"Advances in neural information processing systems"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.21608\/bfemu.2021.209673"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3912-4"},{"key":"ref330","doi-asserted-by":"publisher","DOI":"10.1016\/S0966-6362(97)00042-8"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2938884"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-020-16548-3"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2900035"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1687-6"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-013-1364-4"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2019.2914617"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2680898"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2015.2388544"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2891629"},{"key":"ref335","doi-asserted-by":"publisher","DOI":"10.1063\/1.5097686"},{"key":"ref42","article-title":"Short term memory in Echo State Networks","author":"jaeger","year":"2002"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148617"},{"key":"ref336","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-74938-5"},{"key":"ref41","article-title":"Reservoir computing and self-organized neural hierarchies","author":"luko\u0161evicius","year":"2012"},{"key":"ref215","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-021-87607-y","article-title":"Spatio-temporal feature learning with reservoir computing for T-cell segmentation in live-cell Ca2+ fluorescence microscopy","volume":"11","author":"hadaeghi","year":"2021","journal-title":"Sci Rep"},{"key":"ref333","doi-asserted-by":"publisher","DOI":"10.1007\/BF00337288"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2007.04.017"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/BIOCAS.2018.8584674"},{"key":"ref334","doi-asserted-by":"publisher","DOI":"10.1098\/rstb.2018.0377"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1162\/089976604323057443"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500993"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.12.089"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/5.58337"},{"key":"ref7","first-page":"1","article-title":"Which neural net architectures give rise to exploding and vanishing gradients?","volume":"31","author":"hanin","year":"2018","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2876865"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1162\/neco_a_00990"},{"key":"ref6","first-page":"2370","article-title":"Beyond exploding and vanishing gradients: Analysing RNN training using attractors and smoothness","author":"ribeiro","year":"2020","journal-title":"Proc Int Conf Artif Intell Statist"},{"key":"ref5","article-title":"A review on deep learning techniques applied to semantic segmentation","author":"garcia-garcia","year":"2017","journal-title":"arXiv 1704 06857"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22796-8_41"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.abg1455"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.02.076"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhydene.2016.11.043"},{"key":"ref40","article-title":"Chasing the echo state property","author":"gallicchio","year":"2018","journal-title":"arXiv 1811 10892"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.3233\/AIS-160372"},{"key":"ref306","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pbio.1000260"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuron.2009.07.018"},{"key":"ref307","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.neuro.31.060407.125639"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.2307\/1267352"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2019.02.001"},{"key":"ref304","doi-asserted-by":"publisher","DOI":"10.1109\/PGEC.1965.264137"},{"key":"ref305","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195301069.003.0007"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.01.053"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.2.270"},{"key":"ref302","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuron.2015.09.034"},{"key":"ref30","first-page":"318","article-title":"Learning internal representations by error propagation","author":"rumelhart","year":"1987","journal-title":"Parallel Distributed Processing Explorations in the Microstructure of Cognition Foundations"},{"key":"ref303","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.50.5077"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1007\/978-3-642-35289-8_36","article-title":"A practical guide to applying Echo State Networks","author":"luko\u0161evi?ius","year":"2012","journal-title":"Neural Networks Tricks of the Trade"},{"key":"ref300","doi-asserted-by":"publisher","DOI":"10.1111\/ejn.13796"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/72.846741"},{"key":"ref301","doi-asserted-by":"publisher","DOI":"10.1126\/science.1099745"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2012.07.005"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.06.003"},{"key":"ref308","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1687-6_3"},{"key":"ref309","first-page":"2995","article-title":"Oger: Modular learning architectures for large-scale sequential processing","volume":"13","author":"verstraeten","year":"2012","journal-title":"J Mach Learn Res"},{"key":"ref310","year":"2018","journal-title":"Oger Modular Learning Architectures For Large-Scale Sequential Processing"},{"key":"ref317","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3172586"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1038\/nature12160"},{"key":"ref318","doi-asserted-by":"crossref","first-page":"2575","DOI":"10.1109\/TNNLS.2021.3094139","article-title":"Reservoir memory machines as neural computers","volume":"33","author":"paa\u00dfen","year":"2022","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2019.03.005"},{"key":"ref315","article-title":"Generating oscillation activity with echo state network to mimic the behavior of a simple central pattern generator","author":"foong","year":"2023","journal-title":"arXiv 2306 10927"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/BF00230234"},{"key":"ref316","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1687-6_7"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1152\/jn.1985.53.3.603"},{"key":"ref313","first-page":"1","article-title":"ReservoirComputing.JL: An efficient and modular library for reservoir computing models","volume":"23","author":"martinuzzi","year":"2022","journal-title":"J Mach Learn Res"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"ref314","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16770-6_8"},{"key":"ref311","year":"2017","journal-title":"Easyesn a library for recurrent neural networks using echo state networks"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0265723"},{"key":"ref312","author":"schaetti","year":"2018","journal-title":"Echotorch Reservoir computing with pytorch"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3377929.3389962"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1162\/jocn.1995.7.3.311"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1093\/cercor\/2.2.153"},{"key":"ref319","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3119548"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.79.8.2554"},{"key":"ref320","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3099091"},{"key":"ref321","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3109821"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1002\/qute.202100053"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2018.8357305"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682912"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.7551\/ecal_a_039"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1088\/1748-3190\/aa7663"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/IEDM.2017.8268505"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11179-7_29"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2019.01.002"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1038\/srep03629"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-019-56991-x"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8852472"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26555-1_23"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1109\/TSTE.2019.2890875"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.4249\/scholarpedia.1430"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/862\/5\/052062"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.5772\/10186"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110021"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2007.12.009"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33269-2_69"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.08.122"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2016.7527245"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1145\/3477145.3477267"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966288"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.abh0693"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.03.012"},{"key":"ref132","first-page":"1","article-title":"FPGA implementation of reservoir computing with online learning","author":"antonik","year":"2015","journal-title":"Proc 24th Belg -Dutch Conf Mach Learn"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.3389\/fnins.2015.00502"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115022"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1145\/2967446.2967447"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0246737"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.renene.2018.07.060"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/CICSyN.2015.35"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1038\/srep00287"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-017-02337-y"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.03.032"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1007\/s10470-016-0715-3"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1080\/01691864.2017.1402703"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1038\/nrn1248"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1145\/2765491.2765531"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.14323\/ijuseng.2015.3"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2005.05.019"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.91.020801"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/IoTaIS53735.2021.9628824"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1587\/nolta.13.459"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2015.2458071"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1109\/ISBI.2017.7950697"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pcbi.1010722"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1364\/OE.26.007955"},{"key":"ref265","article-title":"Convolutional reservoir computing for world models","author":"chang","year":"2019","journal-title":"arXiv 1907 08040"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.3389\/fninf.2013.00048"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1364\/OPTICA.2.000438"},{"key":"ref266","first-page":"4rin183","article-title":"Image recognition model based on convolutional reservoir computing","volume":"jsai2020","author":"yonemura","year":"2020","journal-title":"Proc Annu Conf JSAI"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2011.6033233"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/SSP.2018.8450698"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1587\/nolta.13.397"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.05.061"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2013.2274670"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-020-01679-3"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms4541"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.11.100"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-018-21011-x"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2018.8545471"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1063\/1.4990730"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1002\/aisy.202000174"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1162\/neco_a_01222"},{"key":"ref108","author":"wolfram","year":"2018","journal-title":"Cellular Automata and Complexity Collected Papers"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2015.2404803"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1002\/9781118591352"},{"key":"ref109","article-title":"Reservoir computing using cellular automata","author":"yilmaz","year":"2014","journal-title":"arXiv 1410 0162"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-017-9463-7"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pcbi.1006400"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1063\/1.5042342"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6953836"},{"key":"ref75","article-title":"Biologically inspired alternatives to backpropagation through time for learning in recurrent neural nets","author":"bellec","year":"2019","journal-title":"arXiv 1901 09049"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-01928-4_6"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20518-8_7"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TAMD.2011.2159379"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(94)90016-7"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-61616-8_39"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.4324\/9781410612403"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms1476"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/VPPC.2018.8605029"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-020-17236-y"},{"key":"ref103","first-page":"435","article-title":"Machine learning using cellular automata based feature expansion and reservoir computing","volume":"10","author":"yilmaz","year":"2015","journal-title":"J Cellular Automata"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2020.106961"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2007.04.011"},{"key":"ref111","article-title":"Reservoir computing using non-uniform binary cellular automata","author":"nichele","year":"2017","journal-title":"arXiv 1702 03812"},{"key":"ref232","first-page":"349","article-title":"Real-time hardware-based Malware and micro-architectural attack detection utilizing CMOS reservoir computing","volume":"69","author":"chandrasekaran","year":"2022","journal-title":"IEEE Trans Circuits Syst II Exp Briefs"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICARCV.2018.8581122"},{"key":"ref112","article-title":"Deep reservoir computing using cellular automata","author":"nichele","year":"2017","journal-title":"arXiv 1703 02806"},{"key":"ref233","article-title":"Deep delay loop reservoir computing for specific emitter identification","author":"kokalj-filipovic","year":"2020","journal-title":"arXiv 2010 06649"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-017-9467-3"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2769106"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2007.12.020"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.87.042808"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2019.2902845"},{"key":"ref68","first-page":"4243","article-title":"Preparing more effective Liquid State Machines using Hebbian learning","author":"norton","year":"2006","journal-title":"Proc IEEE Int Joint Conf Neural Netw"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1063\/5.0075528"},{"key":"ref67","first-page":"1460","article-title":"Reservoir riddles: Suggestions for echo state network research","author":"jaeger","year":"2005","journal-title":"Proc IEEE Int Joint Conf Neural Netw"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1021\/acssynbio.1c00483"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2017.2766162"},{"key":"ref69","first-page":"55","article-title":"SSO-LSM: A Sparse and Self-Organizing architecture for Liquid State Machine based neural processors","author":"jin","year":"2016","journal-title":"IEEE\/ACM Int Symp on Nanoscale Arch (NANOARCH)"},{"key":"ref118","article-title":"Biochemical reservoir computing","author":"nguyen","year":"2018","journal-title":"Proc Student Res Symp 8"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5481"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1166\/jmihi.2017.2266"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0178663"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36802-9_41"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/SMC42975.2020.9282864"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1162\/isal_a_00324"},{"key":"ref237","article-title":"Road traffic reservoir computing","author":"ando","year":"2019","journal-title":"arXiv 1912 00554"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2007.19.3.757"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966151"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM52596.2021.9653098"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/NaBIC.2014.6921880"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.25088\/ComplexSystems.31.1.103"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2021.127082"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-017-01827-3"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1088\/2634-4386\/ac4339"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2019.2893827"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1080\/00107514.2015.1094987"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1016\/j.snb.2015.03.028"},{"key":"ref62","article-title":"R-FORCE: Robust learning for random recurrent neural networks","author":"zheng","year":"2020","journal-title":"arXiv 2003 11660"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1162\/isal_a_00013"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1016\/j.matcom.2015.06.009"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-61616-8_37"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1002\/advs.202104076"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2018.8591345"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2013.6699377"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966149"},{"key":"ref289","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1687-6_2"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.3934\/matersci.2015.4.530"},{"key":"ref290","doi-asserted-by":"publisher","DOI":"10.1016\/j.conb.2016.01.010"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1162\/NECO_a_00694"},{"key":"ref291","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pcbi.1007544"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1364\/OE.20.003241"},{"key":"ref298","doi-asserted-by":"publisher","DOI":"10.1016\/S0896-6273(00)80821-1"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1364\/OE.20.022783"},{"key":"ref299","doi-asserted-by":"publisher","DOI":"10.1038\/35094565"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2015.2498763"},{"key":"ref296","doi-asserted-by":"publisher","DOI":"10.1038\/338334a0"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1364\/OL.40.003416"},{"key":"ref297","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.ne.18.030195.003011"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1002\/adma.201103053"},{"key":"ref294","doi-asserted-by":"publisher","DOI":"10.1016\/0166-2236(92)90186-C"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1364\/OE.16.011182"},{"key":"ref295","doi-asserted-by":"publisher","DOI":"10.1016\/j.tins.2004.10.010"},{"key":"ref171","first-page":"115","article-title":"Memcapacitive reservoir computing","author":"tran","year":"2017","journal-title":"IEEE\/ACM Int Symp on Nanoscale Arch (NANOARCH)"},{"key":"ref292","doi-asserted-by":"publisher","DOI":"10.1016\/j.celrep.2021.109175"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/ICRC.2019.8914716"},{"key":"ref293","doi-asserted-by":"publisher","DOI":"10.1016\/j.cub.2021.10.034"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1038\/nature23011"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1687-6_13"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2794584"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.3389\/fncom.2013.00091"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.12792\/icisip2017.037"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1007\/s00422-012-0471-0"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1007\/s00422-012-0516-4"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1063\/1.5006918"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevApplied.9.014034"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-14738-1"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1038\/natrevmats.2017.31"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevResearch.3.033243"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2022.128599"},{"key":"ref149","article-title":"Physical reservoir computing built by spintronic devices for temporal information processing","author":"jiang","year":"2019","journal-title":"arXiv 1901 07879"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1687-6_14"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1109\/CSE-EUC-DCABES.2016.229"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevApplied.10.034063"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1117\/12.2578062"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1063\/5.0064771"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0078318"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1080\/17445760.2016.1241880"},{"key":"ref277","article-title":"Time warping invariant echo state networks","author":"luko\u0161evicius","year":"2006"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1089\/soro.2017.0075"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-020-15367-w"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-92257-1"},{"key":"ref275","article-title":"The novel applications of deep reservoir computing in cyber-security and wireless communication","author":"hamedani","year":"2019","journal-title":"Computing and Intelligent Systems"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.7551\/978-0-262-32621-6-ch030"},{"key":"ref272","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106705"},{"key":"ref152","doi-asserted-by":"crossref","DOI":"10.1098\/rsif.2014.0437","article-title":"Exploiting short-term memory in soft body dynamics as a computational resource","volume":"11","author":"nakajima","year":"2014","journal-title":"J Roy Soc Interface"},{"key":"ref273","first-page":"10006","article-title":"Continual general chunking problem and SyncMap","volume":"35","author":"vargas","year":"2021","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"ref270","article-title":"Reservoir computing hardware with cellular automata","author":"mor\u00e1n","year":"2018","journal-title":"arXiv 1806 04932"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1687-6_15"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2021.3124520"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevResearch.3.013077"},{"key":"ref157","first-page":"1","article-title":"The body as a reservoir: Locomotion and sensing with linear feedback","author":"caluwaerts","year":"2011","journal-title":"Proc 2nd Int Conf Morphological Comput (ICMC)"},{"key":"ref278","first-page":"1","article-title":"Reservoir computing: A powerful black-box framework for nonlinear audio processing","author":"holzmann","year":"2009","journal-title":"Proc Int Conf Digital Audio Effects (DAFx)"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1038\/s42005-021-00606-3"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-017-9457-5"},{"key":"ref280","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2003.1224019"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1145\/3145479"},{"key":"ref287","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2013.00500"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966118"},{"key":"ref288","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pcbi.1004967"},{"key":"ref164","first-page":"454","article-title":"Reservoir computing with stochastic bitstream neurons","author":"verstraeten","year":"2005","journal-title":"Proc 16th Annu Prorisc Workshop"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.1016\/j.bandl.2008.08.002"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/PATMOS.2014.6951899"},{"key":"ref286","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0052946"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2014.2311855"},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.1080\/016909600386129"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.3389\/fncom.2015.00068"},{"key":"ref284","doi-asserted-by":"publisher","DOI":"10.1016\/j.cortex.2009.03.007"},{"key":"ref160","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevLett.127.100502","article-title":"Dynamical phase transitions in quantum reservoir computing","volume":"127","author":"mart\u00ednez-pe\u00f1a","year":"2021","journal-title":"Phys Rev Lett"},{"key":"ref281","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.09.049"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1515\/nanoph-2016-0132"},{"key":"ref282","doi-asserted-by":"publisher","DOI":"10.1038\/nature12742"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s004220050182"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2004.1380039"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2009.03.005"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2007.04.003"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1162\/089976602760407955"},{"key":"ref10","first-page":"13","article-title":"The &#x2018;echo state&#x2019; approach to analysing and training recurrent neural networks-with an erratum note","author":"jaeger","year":"2001"},{"key":"ref17","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2014","journal-title":"arXiv 1412 6572"},{"key":"ref16","first-page":"471","article-title":"An overview of reservoir computing: Theory, applications and implementations","author":"schrauwen","year":"2007","journal-title":"Proc 15th Eur Symp Artif Neural Netw"},{"key":"ref19","article-title":"Robustness may be at odds with accuracy","author":"tsipras","year":"2018","journal-title":"arXiv 1805 12152"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1687-6_1"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1016\/j.conb.2011.05.011"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2008.03.014"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1016\/S0960-9822(01)00581-4"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1687-6_18"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2021.3139083"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1002\/qute.202100027"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1098\/rsif.2014.0520"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogsys.2019.08.002"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.7554\/eLife.50316"},{"key":"ref194","first-page":"92","article-title":"Physical reservoir computing in tensegrity with structural softness and ground collision dynamics","volume":"6","author":"fujita","year":"2018","journal-title":"J Inst Ind Appl Eng"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10196105.pdf?arnumber=10196105","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T18:01:49Z","timestamp":1693245709000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10196105\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":336,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3299296","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}