{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T20:55:23Z","timestamp":1775076923801,"version":"3.50.1"},"reference-count":87,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2131156"],"award-info":[{"award-number":["2131156"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3331320","type":"journal-article","created":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T19:07:01Z","timestamp":1699470421000},"page":"125749-125767","source":"Crossref","is-referenced-by-count":36,"title":["Machine Learning in Chaos-Based Encryption: Theory, Implementations, and Applications"],"prefix":"10.1109","volume":"11","author":[{"given":"Jinha","family":"Hwang","sequence":"first","affiliation":[{"name":"Department of Computer Engineering and Computer Science, California State University Long Beach, Long Beach, CA, USA"}]},{"given":"Gauri","family":"Kale","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, California State University Long Beach, Long Beach, CA, USA"}]},{"given":"Persis Premkumar","family":"Patel","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering and Computer Science, California State University Long Beach, Long Beach, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6452-1612","authenticated-orcid":false,"given":"Rahul","family":"Vishwakarma","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering and Computer Science, California State University Long Beach, Long Beach, CA, USA"}]},{"given":"Mehrdad","family":"Aliasgari","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering and Computer Science, California State University Long Beach, Long Beach, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1034-3616","authenticated-orcid":false,"given":"Ava","family":"Hedayatipour","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, California State University Long Beach, Long Beach, CA, USA"}]},{"given":"Amin","family":"Rezaei","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering and Computer Science, California State University Long Beach, Long Beach, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6423-0145","authenticated-orcid":false,"given":"Hossein","family":"Sayadi","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering and Computer Science, California State University Long Beach, Long Beach, CA, USA"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1038\/nature23461"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3004536"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2974226"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-022-04623-2"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2001.941086"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8105"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.03.084"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2906052"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3011524"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100530"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3073514"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/01969722.2023.2166261"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3305271"},{"key":"ref17","year":"2023","journal-title":"Round 1 Submissions for Post-Quantum Cryptography Standardization"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s43926-023-00029-2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2022.3140762"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3218668"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3294570"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2019.2907709"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s00034-018-0905-6"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.3390\/math9243315"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s00034-020-01521-8"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2013.07.029"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1364\/OE.388182"},{"key":"ref41","first-page":"90","article-title":"A comprehensive analysis of chaos-based secure systems","author":"hedayatipour","year":"2021","journal-title":"Proc 2nd Conf Silicon Valley Cybersecurity Conf (SVCC)"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149379"},{"key":"ref44","first-page":"1","article-title":"FPGA implementation of fractional-order Chua&#x2019;s chaotic system","author":"el-maksoud","year":"2018","journal-title":"Proc 7th Int Conf Modern Circuits Syst Technol (MOCAST)"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0158348"},{"key":"ref87","article-title":"Performance analysis and comparison of machine and deep learning algorithms for IoT data classification","author":"vakili","year":"2020","journal-title":"arXiv 2001 09636"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1142\/WSSNSA"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3571071"},{"key":"ref7","author":"wiederrecht","year":"2023","journal-title":"RBC Capital Markets Navigating the Changing Face of Healthcare Episode"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-019-13517-3"},{"key":"ref4","first-page":"213","article-title":"Financial supervision in digital age: Innovations and data abundance","author":"monkiewicz","year":"2023","journal-title":"Digital Finance and the Future of the Global Financial System"},{"key":"ref3","article-title":"A preliminary study on pattern reconstruction for optimal storage of wearable sensor data","author":"mahfuz","year":"2023","journal-title":"arXiv 2302 12972"},{"key":"ref6","year":"2023","journal-title":"RBC Capital Markets Navigating the Changing Face of Healthcare Episode"},{"key":"ref5","article-title":"Addressing money laundering in the United States real estate sector","author":"mccormick","year":"2023"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED57927.2023.10129355"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102552"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2022.3178103"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746561"},{"key":"ref83","article-title":"A deep learning based attack for the chaos-based image encryption","author":"he","year":"2019","journal-title":"arXiv 1907 12245"},{"key":"ref80","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1016\/j.wneu.2016.05.010","article-title":"Brainjacking: Implant security issues in invasive neuromodulation","volume":"92","author":"formatted","year":"2016","journal-title":"World Neurosurg"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s10470-006-1432-0"},{"key":"ref79","first-page":"1","article-title":"Hacking medical devices for fun and insulin: Breaking the human SCADA system","author":"radcliffe","year":"2011","journal-title":"Proc Black Hat Conf Presentation Slides"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1049\/el:20030881"},{"key":"ref78","first-page":"150","article-title":"Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system","author":"li","year":"2011","journal-title":"Proc IEEE 13th Int Conf e-Health Netw Appl Services"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2021.3096967"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2016.2611442"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2009.5235892"},{"key":"ref75","author":"landi","year":"2021","journal-title":"Fitbit Apple User Data Exposed in Breach Impacting 61M Fitness Tracker Records"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.1997.621829"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC.2017.8058363"},{"key":"ref33","first-page":"712","article-title":"An FPGA implementation of chaos based image encryption and its performance analysis","volume":"5","author":"baruah","year":"2016","journal-title":"Int J Comp Sci and Netw"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.12785\/ijcds\/0906020"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC.2018.8653652"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3029130"},{"key":"ref1","year":"2020","journal-title":"IDC&#x2019;s global datasphere forecast shows continued steady growth in the creation and consumption of data"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119076"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3203067"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2017.41"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/RBME.2020.2969915"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/GCCE.2015.7398569"},{"key":"ref72","first-page":"313","article-title":"Majority vote of ensemble machine learning methods for real-time epilepsy prediction applied on EEG pediatric data","volume":"7","author":"juki?","year":"2018","journal-title":"TEM J"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/81.915386"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/DCAS57389.2023.10130267"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cdt.2018.5005"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2022.106452"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/S0960-0779(03)00077-8"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127402005364"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2015.7280576"},{"key":"ref20","article-title":"Benchmarking at the frontier of hardware security: Lessons from logic locking","author":"tan","year":"2020","journal-title":"arXiv 2006 06806"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.102.052203"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1063\/5.0006304"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1063\/1.2336739"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1063\/1.5010300"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/81.873879"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.99.042203"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/7520590"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/8424139"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2005.1594398"},{"key":"ref60","doi-asserted-by":"crossref","DOI":"10.1142\/S0218127415500212","article-title":"Attack on a chaos-based random number generator using anticipating synchronization","volume":"25","author":"yeni\u00e7eri","year":"2015","journal-title":"Int J Bifurcation Chaos"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1063\/1.5028373"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevResearch.2.012080"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6287639\/10005208\/10311558-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10311558.pdf?arnumber=10311558","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,29]],"date-time":"2023-11-29T16:28:49Z","timestamp":1701275329000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10311558\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":87,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3331320","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}