{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:24:30Z","timestamp":1769747070776,"version":"3.49.0"},"reference-count":83,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFB1600400"],"award-info":[{"award-number":["2020YFB1600400"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development Program of Guangzhou","award":["202007050002"],"award-info":[{"award-number":["202007050002"]}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61806198"],"award-info":[{"award-number":["61806198"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61533019"],"award-info":[{"award-number":["61533019"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1811463"],"award-info":[{"award-number":["U1811463"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2018AAA0101502"],"award-info":[{"award-number":["2018AAA0101502"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cybern."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/tcyb.2021.3105568","type":"journal-article","created":{"date-parts":[[2021,11,24]],"date-time":"2021-11-24T20:32:21Z","timestamp":1637785941000},"page":"13181-13196","source":"Crossref","is-referenced-by-count":38,"title":["An ACP-Based Parallel Approach for Color Image Encryption Using Redundant Blocks"],"prefix":"10.1109","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9732-3217","authenticated-orcid":false,"given":"Wenbo","family":"Zheng","sequence":"first","affiliation":[{"name":"State Key Laboratory for Management and Control of Complex Systems, Institute of Automation, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6452-9649","authenticated-orcid":false,"given":"Lan","family":"Yan","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Management and Control of Complex Systems, Institute of Automation, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4128-886X","authenticated-orcid":false,"given":"Chao","family":"Gou","sequence":"additional","affiliation":[{"name":"School of Intelligent Systems Engineering, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9185-3989","authenticated-orcid":false,"given":"Fei-Yue","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Management and Control of Complex Systems, Institute of Automation, Chinese Academy of Sciences, Beijing, China"}]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.369"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127499001024"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2004.02.060"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref74","article-title":"Chexnet: Radiologist-level pneumonia detection on chest X-rays with deep learning","author":"rajpurkar","year":"2017","journal-title":"arXiv 1711 05225"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.04.051"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1038\/s41591-018-0268-3"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2006.1688473"},{"key":"ref78","doi-asserted-by":"crossref","DOI":"10.1002\/9780470148778","author":"stamp","year":"2007","journal-title":"Applied Cryptanalysis Breaking Ciphers in the Real World"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-020-03063-0"},{"key":"ref33","first-page":"12","article-title":"The non-linear chaotic improved model of the electric power system short-term load forecasting","volume":"32","author":"jin","year":"2000","journal-title":"Proc CSEE"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(93)90009-P"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2018.09.140"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.122591"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2963138"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.06.013"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.02.016"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICONIP.2002.1201915"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.03.019"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2019.8766229"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2221-x"},{"key":"ref63","first-page":"161","article-title":"La cryptographie militaire","volume":"ix","author":"petitcolas","year":"1883","journal-title":"J Sci Militaires"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2007.07.040"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1038\/261459a0"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.12.044"},{"key":"ref65","author":"h\u00e9non","year":"2004","journal-title":"A two-dimensional mapping with a strange attractor"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0082847"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(85)90011-9"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1175\/1520-0469(1963)020<0130:DNF>2.0.CO;2"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/0375-9601(76)90101-8"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127402004620"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2017.2716952"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2020.3043147"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2010.06.005"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2007.4338496"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6797386"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2010.2060218"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2008.112"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.03.008"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1126\/scirobotics.aaw4106"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s00542-019-04395-2"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.03.006"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2017.09.099"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.02.156"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.11.009"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.08.009"},{"key":"ref55","article-title":"USC-SIPI image database version 5","author":"weber","year":"1997"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s00542-019-04676-w"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08470-8"},{"key":"ref52","first-page":"23","article-title":"An efficient colour image encryption scheme based on 1-D chaotic maps","volume":"46","author":"patro","year":"2019","journal-title":"J Inf Security Appl"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1038\/35101752"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa7298"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"959","DOI":"10.1016\/j.chaos.2005.02.002","article-title":"Adaptive synchronization of hyperchaotic chen system with uncertain parameters","volume":"26","author":"ju","year":"2005","journal-title":"Chaos Solitons Fractals"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2363168"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2846186"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-017-01248-2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-013-1074-6"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-020-2598-9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2682561"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-020-2818-3"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-013-1070-x"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-014-1757-7"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-020-2293-x"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-013-1533-6"},{"key":"ref80","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1098\/rstb.2002.1203","article-title":"Does the perception of moving eyes trigger reflexive visual orienting in autism?","volume":"358","author":"frith","year":"2003","journal-title":"Philos Trans Roy Soc London B Biol Sci"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.05.015"},{"key":"ref3","article-title":"Frequency principle in broad learning system","author":"chen","year":"2021","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/int.22372"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2020.10.007"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01246"},{"key":"ref7","first-page":"12747","article-title":"Two heads are better than one: Hypergraph-enhanced graph reasoning for visual event ratiocination","volume":"139","author":"zheng","year":"2021","journal-title":"Proc 38th Int Conf Mach Learn"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102470"},{"key":"ref9","first-page":"736","author":"zheng","year":"2020","journal-title":"Learning From the Past Meta-Continual Learning With Knowledge Embedding for Jointly Sketch Cartoon and Caricature Face Recognition"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.02.036"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2879857"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2019.1595751"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cvi.2015.0344"},{"key":"ref42","first-page":"6659","article-title":"A new six-dimensional hyperchaotic system and its circuit implementation","volume":"13","author":"zhang","year":"2013","journal-title":"Sci Technol Eng"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.9.11.859-866"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MUE.2009.42"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.855414"}],"container-title":["IEEE Transactions on Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221036\/9954939\/09626576.pdf?arnumber=9626576","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T02:29:45Z","timestamp":1699842585000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9626576\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":83,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tcyb.2021.3105568","relation":{},"ISSN":["2168-2267","2168-2275"],"issn-type":[{"value":"2168-2267","type":"print"},{"value":"2168-2275","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12]]}}}