{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T08:12:18Z","timestamp":1774685538869,"version":"3.50.1"},"reference-count":99,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012639","name":"Prince Sultan University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012639","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2022,11,1]]},"DOI":"10.1109\/tnse.2022.3199235","type":"journal-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T01:02:21Z","timestamp":1667523741000},"page":"4322-4337","source":"Crossref","is-referenced-by-count":80,"title":["A Novel Chaos-Based Privacy-Preserving Deep Learning Model for Cancer Diagnosis"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4228-385X","authenticated-orcid":false,"given":"Mujeeb Ur","family":"Rehman","sequence":"first","affiliation":[{"name":"School of Computing, Edinburgh Napier University, Edinburgh, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7495-2248","authenticated-orcid":false,"given":"Arslan","family":"Shafique","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Riphah International University, Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7121-495X","authenticated-orcid":false,"given":"Yazeed Yasin","family":"Ghadi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Software Engineering, Al Ain University, Abu Dhabi, UAE"}]},{"given":"Wadii","family":"Boulila","sequence":"additional","affiliation":[{"name":"Robotics, Internet of Things Lab, Prince Sultan University, Riyadh, Saudi Arabia"}]},{"given":"Sana Ullah","family":"Jan","sequence":"additional","affiliation":[{"name":"School of Computing, Edinburgh Napier University, Edinburgh, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0097-801X","authenticated-orcid":false,"given":"Thippa Reddy","family":"Gadekallu","sequence":"additional","affiliation":[{"name":"School of Information Technology Engineering, Vellore Institute of Technology, Vellore, Tamil Nadu, India"}]},{"given":"Maha","family":"Driss","sequence":"additional","affiliation":[{"name":"RIADI Laboratory, University of Manouba, Manouba, Tunisia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6289-8248","authenticated-orcid":false,"given":"Jawad","family":"Ahmad","sequence":"additional","affiliation":[{"name":"School of Computing, Edinburgh Napier University, Edinburgh, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2936841"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2014.2304959"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2014.2303821"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2007.911547"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2013.2271383"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2935141"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941543"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/cncr.33587"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-6736(19)32034-3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1186\/bcr1412"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cgh.2019.10.009"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/17425255.2021.2029405"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3011675"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2019.2936500"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07680-w"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2335"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1140\/epjp\/i2018-12138-3"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10695-5"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1140\/epjp\/s13360-020-00187-0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2956385"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/sym11020140"},{"issue":"3","key":"ref22","first-page":"137","article-title":"Reijndael: The advanced encryption standard","volume":"26","author":"Daemen","year":"2001","journal-title":"Dr Dobb\u2019s J. Softw. Tools Professional Programmer"},{"key":"ref23","volume-title":"Data Encryption Standard","volume":"112","author":"Standard","year":"1999"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2021.3091471"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/s21103322"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2021.104754"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/app11177940"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1002\/ima.22653"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/ima.22654"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/s22020461"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-02067-8"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-019-13517-3"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127406015970"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2018.12.002"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2022.3184668"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2022.3178629"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2018.09.048"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2020.02.007"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7453-3"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5594-9"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-020-01936-z"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-019-05157-5"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-38700-6_1"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-08879-6"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3069591"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2020.2986762"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2017.2751523"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2019.2947595"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2020.2980831"},{"key":"ref51","first-page":"209","article-title":"Cataract detection using convolutional neural network with VGG-19 model","volume-title":"Proc. IEEE World AI IoT Congr.","author":"Khan","year":"2021"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2015.2458702"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.5505\/pajes.2021.38668"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s12065-020-00403-x"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.02.096"},{"issue":"1","key":"ref56","article-title":"Breast lesion classification based on dynamic contrast-enhanced magnetic resonance images sequences with long short-term memory networks","volume":"6","author":"Antropova","year":"2018","journal-title":"J. Med. Imag."},{"key":"ref57","article-title":"Definition, diagnosis and classification of diabetes mellitus and its complications: Report of a who consultation. part 1, diagnosis and classification of diabetes mellitus","volume":"2","author":"Organization","year":"1999"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-017-9191-x"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2021.3050052"},{"key":"ref60","article-title":"Image encryption using differential evolution approach in frequency domain","author":"Hassan","year":"2011"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2019.0051"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1504\/IJBM.2017.084135"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3125961"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.3390\/sym11030351"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2019.05.015"},{"issue":"10","key":"ref66","first-page":"454","article-title":"Brain tumor detection using shape features and machine learning algorithms","volume":"5","author":"George","year":"2015","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"ref67","first-page":"3672","article-title":"MRI image based brain tumor detection using machine learning","volume":"81","author":"Kshirsagar","year":"2020","journal-title":"Test Eng. Manage."},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.572"},{"key":"ref69","article-title":"CNN for dummies","author":"Wu","year":"2015"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/icivc.2017.7984661"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.3390\/rs13112221"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2018.03.032"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54526-4_43"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ETECHNXT.2018.8385355"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICTCS.2019.8923053"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.02.072"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.3233\/JIN-180081"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.cjph.2018.04.013"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-013-1105-3"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2014.02.011"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1667-5"},{"issue":"2","key":"ref83","article-title":"Image encryption based on Chebyshev chaotic map and S8 S-boxes","volume":"49","author":"Hussain","year":"2019","journal-title":"Optica Applicata"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09699-4"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6996-z"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-021-03364-x"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-06554-y"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.matcom.2020.07.007"},{"key":"ref89","article-title":"How to construct deep recurrent neural networks","author":"Pascanu","year":"2013"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6289082"},{"key":"ref91","article-title":"Deep belief networks for phone recognition","volume-title":"Proc. NIPS Workshop Deep Learn. Speech Recognit. Related Appl.","author":"Mohamed","year":"2009"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-2164-2_19"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/8387680"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.020866"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2021.012632"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/s12539-020-00403-6"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/0098-3004(93)90090-R"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9878-1_4"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-022-00705-w"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488902\/9933169\/09858333.pdf?arnumber=9858333","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T02:36:11Z","timestamp":1706063771000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9858333\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,1]]},"references-count":99,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tnse.2022.3199235","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"value":"2327-4697","type":"electronic"},{"value":"2334-329X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,1]]}}}