{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T19:54:14Z","timestamp":1775505254999,"version":"3.50.1"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Neural Netw. Learning Syst."],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1109\/tnnls.2016.2619345","type":"journal-article","created":{"date-parts":[[2016,11,3]],"date-time":"2016-11-03T14:22:10Z","timestamp":1478182930000},"page":"195-207","source":"Crossref","is-referenced-by-count":328,"title":["Synchronization of an Inertial Neural Network With Time-Varying Delays and Its Application to Secure Communication"],"prefix":"10.1109","volume":"29","author":[{"given":"Shanmugam","family":"Lakshmanan","sequence":"first","affiliation":[]},{"given":"Mani","family":"Prakash","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4191-9083","authenticated-orcid":false,"given":"Chee Peng","family":"Lim","sequence":"additional","affiliation":[]},{"given":"Rajan","family":"Rakkiyappan","sequence":"additional","affiliation":[]},{"given":"Pagavathigounder","family":"Balasubramaniam","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0360-5270","authenticated-orcid":false,"given":"Saeid","family":"Nahavandi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2015.07.003"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.02.052"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.10.072"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.02.003"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.nonrwa.2008.04.025"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970777"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1002\/rnc.1384"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2006.11.009"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-015-1838-7"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-009-9503-2"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-2789(97)00008-0"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2004-00327-2"},{"key":"ref2","author":"cochocki","year":"1993","journal-title":"Neural Networks for Optimization and Signal Processing"},{"key":"ref1","author":"haykin","year":"1998","journal-title":"Neural Networks A Comprehensive Foundation"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2007.07.040"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.08.017"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.08.079"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-011-0006-6"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.04.001"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(87)90021-2"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1137\/0131012"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2007.08.008"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/34.655647"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/BF02457822"},{"key":"ref40","author":"goldreich","year":"1995","journal-title":"Foundations of Cryptography"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-011-0697-0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2014.2387355"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0960-0779(04)00368-6"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.06.001"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1186\/1752-0509-6-136"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2007.902958"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2012.2215804"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-014-1492-0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.physd.2004.10.010"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2014.2365059"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2013.2247626"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2011.2178563"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/21.87054"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2010.2048925"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-011-0775-4"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cta.2008.0213"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2011.11.030"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"1995","DOI":"10.1007\/s11071-012-0402-6","article-title":"An intertwining chaotic maps based image encryption scheme","volume":"69","author":"sam","year":"2012","journal-title":"Nonlinear Dyn"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/REG5.2003.1199708"},{"key":"ref47","first-page":"525","article-title":"Chaotic image encryption system using phase-magnitude transformation and pixel substitution","volume":"52","author":"borujeni","year":"2013","journal-title":"Telecommun Syst"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2009.03.084"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-013-0314-4"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2008.01.028"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2007.01.081"}],"container-title":["IEEE Transactions on Neural Networks and Learning Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5962385\/8244326\/07733163.pdf?arnumber=7733163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:41:40Z","timestamp":1641987700000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7733163\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":50,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tnnls.2016.2619345","relation":{},"ISSN":["2162-237X","2162-2388"],"issn-type":[{"value":"2162-237X","type":"print"},{"value":"2162-2388","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1]]}}}