{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T05:07:40Z","timestamp":1768108060747,"version":"3.49.0"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T00:00:00Z","timestamp":1517443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Macau Science and Technology Development Fund","award":["FDCT\/016\/2015\/A1"],"award-info":[{"award-number":["FDCT\/016\/2015\/A1"]}]},{"name":"Research Committee at University of Macau","award":["MYRG2014-00003-FST"],"award-info":[{"award-number":["MYRG2014-00003-FST"]}]},{"name":"Research Committee at University of Macau","award":["MYRG2016-00123-FST"],"award-info":[{"award-number":["MYRG2016-00123-FST"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cybern."],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1109\/tcyb.2016.2642166","type":"journal-article","created":{"date-parts":[[2017,1,4]],"date-time":"2017-01-04T14:11:31Z","timestamp":1483539091000},"page":"463-473","source":"Crossref","is-referenced-by-count":54,"title":["Designing Hyperchaotic Cat Maps With Any Desired Number of Positive Lyapunov Exponents"],"prefix":"10.1109","volume":"48","author":[{"given":"Zhongyun","family":"Hua","sequence":"first","affiliation":[]},{"given":"Shuang","family":"Yi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4487-6384","authenticated-orcid":false,"given":"Yicong","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Chengqing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.72.016220"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AEF.1.183"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.09.055"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2011.11.030"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2015.07.008"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2734-2_14"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICYCS.2008.449"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2016.2598822"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"1203","DOI":"10.1109\/TCSVT.2014.2369711","article-title":"Design and ARM-embedded implementation of a chaotic map-based real-time secure video communication system","volume":"25","author":"lin","year":"2015","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2004.827493"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2014.2356912"},{"key":"ref40","author":"nance","year":"2011","journal-title":"Periods of the discretized Arnold Cat map and its extension to n dimensions"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2011.2180429"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.01.017"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-013-0924-6"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.110.184101"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127405013988"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127409023275"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/cta.213"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127403008065"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2004.842413"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/S0960-0779(96)00056-2"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2012.2219859"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(91)90012-X"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2504180"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(85)90011-9"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2171534"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2363168"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2336976"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2007.901576"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1890\/0012-9658(2003)084[0252:PGISAT]2.0.CO;2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/81.989174"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1175\/1520-0469(1963)020<0130:DNF>2.0.CO;2"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1017\/S0308210511001648"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2013.2283994"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2005.1600703"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.38.3017"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2016.2515398"},{"key":"ref47","author":"storer","year":"2001","journal-title":"An Introduction to Data Structures and Algorithms"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2014.2304655"},{"key":"ref42","first-page":"819","article-title":"3D extensions of some 2D chaotic maps and their usage in data encryption","author":"lian","year":"2003","journal-title":"Proc IEEE 4th Int Conf Control Autom"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.11.018"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2483621"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1063\/1.4959538"},{"key":"ref44","author":"weisstein","year":"2002","journal-title":"Vieta&#x2019;s Formulas"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2235907"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/0375-9601(95)00122-J"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2003.12.022"}],"container-title":["IEEE Transactions on Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221036\/8246764\/07805290.pdf?arnumber=7805290","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:41:47Z","timestamp":1641987707000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7805290\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":48,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tcyb.2016.2642166","relation":{},"ISSN":["2168-2267","2168-2275"],"issn-type":[{"value":"2168-2267","type":"print"},{"value":"2168-2275","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2]]}}}