{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:27:46Z","timestamp":1763191666810,"version":"3.45.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1109\/ijcnn64981.2025.11227573","type":"proceedings-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T18:46:15Z","timestamp":1763145975000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Feature-Aware Chaotic Image Encryption Scheme For Data Security and Privacy in IoT and Edge Networks"],"prefix":"10.1109","author":[{"given":"Muhammad Shahbaz","family":"Khan","sequence":"first","affiliation":[{"name":"Edinburgh Napier University,School of Computing, Engineering and the Built Environment,Edinburgh,UK"}]},{"given":"Ahmed","family":"Al-Dubai","sequence":"additional","affiliation":[{"name":"Edinburgh Napier University,School of Computing, Engineering and the Built Environment,Edinburgh,UK"}]},{"given":"Jawad","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Prince Mohammad Bin Fahd University,Cyber Security Center,Al-Khobar,Saudi Arabia"}]},{"given":"Nikolaos","family":"Pitropakis","sequence":"additional","affiliation":[{"name":"Edinburgh Napier University,School of Computing, Engineering and the Built Environment,Edinburgh,UK"}]},{"given":"Baraq","family":"Ghaleb","sequence":"additional","affiliation":[{"name":"Edinburgh Napier University,School of Computing, Engineering and the Built Environment,Edinburgh,UK"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/s23167194"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2019918763"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/PICMET.2015.7273174"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3415411"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.209"},{"key":"ref7","article-title":"A survey on securing image-centric edge intelligence","author":"Tang","year":"2024","journal-title":"ACM Transactions on Multimedia Computing, Communications and Applications"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICEET60227.2023.10525758"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2023-Fall60731.2023.10333478"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.125050"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD59638.2023.10478378"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124891"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127424502055"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-12595-8"},{"key":"ref15","first-page":"4214","article-title":"A novel cosine-modulated-polynomial chaotic map to strengthen image encryption algorithms in iot environments","volume-title":"Procedia Computer Science","volume":"246","author":"Khan","year":"2024"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-022-04979-1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/e24020287"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/sym14030443"}],"event":{"name":"2025 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2025,6,30]]},"location":"Rome, Italy","end":{"date-parts":[[2025,7,5]]}},"container-title":["2025 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11227166\/11227148\/11227573.pdf?arnumber=11227573","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:23:08Z","timestamp":1763191388000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11227573\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/ijcnn64981.2025.11227573","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]}}}