{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:42:14Z","timestamp":1774539734298,"version":"3.50.1"},"reference-count":70,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2019YFB1706003"],"award-info":[{"award-number":["2019YFB1706003"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2019M663358"],"award-info":[{"award-number":["2019M663358"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U20B2046"],"award-info":[{"award-number":["U20B2046"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong Higher Education Innovation Group","award":["2020KCXTD007"],"award-info":[{"award-number":["2020KCXTD007"]}]},{"name":"Guangzhou Higher Education Innovation Group","award":["202032854"],"award-info":[{"award-number":["202032854"]}]},{"name":"Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme"},{"name":"Guangdong-Macau Joint Laboratory for Advanced and Intelligent Computing","award":["2020B1212030003"],"award-info":[{"award-number":["2020B1212030003"]}]},{"name":"Guangdong-Macau Joint STI Project Intelligent Target Detecting and Tracking on Electronic Fence","award":["2021A0505080008"],"award-info":[{"award-number":["2021A0505080008"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Green Commun. Netw."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1109\/tgcn.2021.3095707","type":"journal-article","created":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T19:21:26Z","timestamp":1625772086000},"page":"89-106","source":"Crossref","is-referenced-by-count":81,"title":["IEPSBP: A Cost-Efficient Image Encryption Algorithm Based on Parallel Chaotic System for Green IoT"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7546-852X","authenticated-orcid":false,"given":"Zhaoquan","family":"Gu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9045-561X","authenticated-orcid":false,"given":"Hao","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4015-1378","authenticated-orcid":false,"given":"Sajid","family":"Khan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2799-0668","authenticated-orcid":false,"given":"Lianbing","family":"Deng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4235-9671","authenticated-orcid":false,"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8972-8094","authenticated-orcid":false,"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9409-5359","authenticated-orcid":false,"given":"Zhihong","family":"Tian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2910217"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.492"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2838"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2005.1460517"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2942296"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2997077"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2938778"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/s19245366"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-9574-1_15"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647713"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICOEI.2019.8862559"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2005.861196"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249229"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.2996738"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2951620"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2842773"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2005.1606170"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2020.011834"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/sym11020293"},{"key":"ref20","volume-title":"Global Energy & CO2 Status Report 2019","year":"2019"},{"key":"ref21","volume-title":"Global Warning of 1.5 \u00b0c: Summary for Policymakers","year":"2018"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800175"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/app9081561"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102663"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.306"},{"issue":"4","key":"ref26","first-page":"322","article-title":"A new image encryption scheme for secure digital images based on combination of polynomial chaotic maps","volume":"4","author":"Abd El-Latif","year":"2012","journal-title":"Res. J. Appl. Sci. Eng. Technol."},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2017.080151"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14257\/ijfgcn.2018.11.5.06"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2015.07.005"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.03.031"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-7091-5_14"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2015.7289152"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3338507.3358620"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102533"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.09.015"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2014.8.4.09"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-012-1173-2"},{"issue":"5","key":"ref38","first-page":"877","article-title":"A comparative survey on symmetric key encryption techniques","volume":"4","author":"Agrawal","year":"2012","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/s18061675"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2016.03.020"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2002.1011451"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.03.055"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-08826-5"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127499001498"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.12.005"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2005.11.090"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.06.014"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2019.03.026"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-019-04791-3"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972296"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.02.028"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2363168"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.08.041"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2016.12.007"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.08.020"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.07.049"},{"issue":"2","key":"ref57","first-page":"31","article-title":"NPCR and UACI randomness tests for image encryption","volume":"1","author":"Wu","year":"2011","journal-title":"Cyber J. Multidiscipl. J. Sci. Technol. J. Sel. Areas Telecommun. (JSAT)"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.03.011"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-017-3874-6"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.05.008"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-018-4659-2"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2011.10.023"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.10.011"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2004.03.004"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2907754"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2791944"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2016.12.018"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-018-4426-4"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.02.016"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.03.022"}],"container-title":["IEEE Transactions on Green Communications and Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7511293\/9714516\/09477305.pdf?arnumber=9477305","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T23:09:01Z","timestamp":1705014541000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9477305\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":70,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tgcn.2021.3095707","relation":{},"ISSN":["2473-2400"],"issn-type":[{"value":"2473-2400","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3]]}}}