{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T13:48:02Z","timestamp":1776347282166,"version":"3.51.2"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2019YFB1803500"],"award-info":[{"award-number":["2019YFB1803500"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62045009"],"award-info":[{"award-number":["62045009"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61731014"],"award-info":[{"award-number":["61731014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004480","name":"Natural Science Foundation of Shanxi Province","doi-asserted-by":"publisher","award":["202103021224038"],"award-info":[{"award-number":["202103021224038"]}],"id":[{"id":"10.13039\/501100004480","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004480","name":"Natural Science Foundation of Shanxi Province","doi-asserted-by":"publisher","award":["20210302123185"],"award-info":[{"award-number":["20210302123185"]}],"id":[{"id":"10.13039\/501100004480","id-type":"DOI","asserted-by":"publisher"}]},{"name":"International Cooperation of Key Research and Development Program of Shanxi Province","award":["201903D421012"],"award-info":[{"award-number":["201903D421012"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/tifs.2023.3240859","type":"journal-article","created":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T19:25:45Z","timestamp":1675106745000},"page":"1410-1420","source":"Crossref","is-referenced-by-count":20,"title":["Improvement of Min-Entropy Evaluation Based on Pruning and Quantized Deep Neural Network"],"prefix":"10.1109","volume":"18","author":[{"given":"Haohao","family":"Li","sequence":"first","affiliation":[{"name":"Key Laboratory of Advanced Transducers and Intelligent Control System, Ministry of Education of China, College of Physics and Optoelectronics, Taiyuan University of Technology, Taiyuan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3142-1567","authenticated-orcid":false,"given":"Jianguo","family":"Zhang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Advanced Transducers and Intelligent Control System, Ministry of Education of China, College of Physics and Optoelectronics, Taiyuan University of Technology, Taiyuan, China"}]},{"given":"Zhihu","family":"Li","sequence":"additional","affiliation":[{"name":"China Electric Power Research Institute, Beijing, China"}]},{"given":"Juan","family":"Liu","sequence":"additional","affiliation":[{"name":"Nations Technology Company Ltd, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2319-8913","authenticated-orcid":false,"given":"Yuncai","family":"Wang","sequence":"additional","affiliation":[{"name":"Advanced Institute of Photonic Technology, Guangdong University of Technology, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/LPT.2011.2180521"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1364\/OL.44.002446"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2014.326"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1364\/oe.382234"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/e20110886"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-019-05818-8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.08.034"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_10"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.250627"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.164"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2013.2265952"},{"key":"ref13","volume-title":"Sp 800\u201322 Rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications","author":"Rukhin","year":"2010"},{"key":"ref14","volume-title":"BSI AIS 31: Functionality Classes and Evaluation Methodology for True (Physical) Random Number Generators, Version 3.1","author":"Killmann","year":"2001"},{"key":"ref15","volume-title":"The Marsaglia Random Number CDROM Including the Diehard Battery of Tests of Randomness","author":"Marsaglia","year":"1996"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1268776.1268777"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2777342"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2826448"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00168"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022098"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_19"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01704-0_13"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2850770"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/e22101134"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1162\/neco_a_01199"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-019-05815-0"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-90B","volume-title":"Recommendation for the Entropy Sources Used for Random Bit Generation","author":"Turan","year":"2018"},{"key":"ref29","volume-title":"NIST Draft Special Publication 800-90B: Recommendation for the Entropy Sources Used for Random Bit Generation","author":"Barker","year":"2012"},{"key":"ref30","first-page":"2148","article-title":"Predicting parameters in deep learning","volume-title":"Proc. 26th Int. Conf. Neural Inf. Process. Syst.","volume":"2","author":"Denil"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2761740"},{"key":"ref32","first-page":"4860","article-title":"Learning to prune deep neural networks via layer-wise optimal brain surgeon","volume-title":"Proc. 31st Int. Conf. Neural Inf. Process. Syst.","volume":"30","author":"Dong"},{"key":"ref33","first-page":"1135","article-title":"Learning both weights and connections for efficient neural networks","volume-title":"Proc. 28th Int. Conf. Neural Inf. Process. Syst.","volume":"1","author":"Han"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.5244\/C.29.31"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.643"},{"issue":"4","key":"ref36","first-page":"3","article-title":"Deep compression: Compressing deep neural networks with pruning, trained quantization and Huffman coding","volume":"56","author":"Han","year":"2015","journal-title":"Fiber"},{"key":"ref37","first-page":"1","article-title":"To prune, or not to prune: Exploring the efficacy of pruning for model compression","volume-title":"Proc. 6th Int. Conf. Learn. Represent., (ICLR)","author":"Zhu"},{"key":"ref38","first-page":"2285","article-title":"Compressing neural networks with the hashing trick","volume-title":"Proc. ICML","author":"Chen"},{"key":"ref39","first-page":"1027","article-title":"K-means++: The advantages of careful seeding","volume-title":"Proc. Annu. ACM-SIAM Symp. Discrete Algorithms","author":"Arthur"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9970396\/10032186.pdf?arnumber=10032186","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T10:44:48Z","timestamp":1707821088000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10032186\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/tifs.2023.3240859","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}