{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:55Z","timestamp":1750220755703,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,8]],"date-time":"2020-07-08T00:00:00Z","timestamp":1594166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,8]]},"DOI":"10.1145\/3377929.3389933","type":"proceedings-article","created":{"date-parts":[[2020,8,26]],"date-time":"2020-08-26T15:26:58Z","timestamp":1598455618000},"page":"291-292","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Preliminary study of applied binary neural networks for neural cryptography"],"prefix":"10.1145","author":[{"given":"Raul Horacio Valencia","family":"Tenorio","sequence":"first","affiliation":[{"name":"University of Auckland, Auckland"}]},{"given":"Chiu Wing","family":"Sham","sequence":"additional","affiliation":[{"name":"University of Auckland, Auckland"}]},{"given":"Danilo Vasconcellos","family":"Vargas","sequence":"additional","affiliation":[{"name":"Kyushu University, Fukuoka, Japan"}]}],"member":"320","published-online":{"date-parts":[[2020,7,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2002.998375"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Murilo Coutinho etal 2018. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography. Sensors 18 5 (2018).  Murilo Coutinho et al. 2018. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography. Sensors 18 5 (2018).","DOI":"10.3390\/s18051306"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1224257.1224544"},{"key":"e_1_3_2_1_4_1","unstructured":"Ian Goodfellow etal 2014. Generative Adversarial Nets. In Advances in Neural Information Processing Systems 27 Z. Ghahramani M. Welling C. Cortes N. D. Lawrence and K. Q. Weinberger (Eds.). Curran Associates Inc. 2672--2680.  Ian Goodfellow et al. 2014. Generative Adversarial Nets. In Advances in Neural Information Processing Systems 27 Z. Ghahramani M. Welling C. Cortes N. D. Lawrence and K. Q. Weinberger (Eds.). Curran Associates Inc. 2672--2680."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.08.012"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"J. Katz and Y. Lindell. 2008. Introduction to modern cryptography. Chapman & Hall\/CRC.  J. Katz and Y. Lindell. 2008. Introduction to modern cryptography. Chapman & Hall\/CRC.","DOI":"10.1201\/9781420010756"},{"key":"e_1_3_2_1_7_1","volume-title":"Fixed-Point Implementation of Convolutional Neural Networks for Image Classification. In 2018 International Conference on Advanced Technologies for Communications (ATC). 105--109","author":"Lo Chun-Yan","year":"2018","unstructured":"Chun-Yan Lo , Francis C. M. Lau , and Chiu-Wing Sham . 2018 . Fixed-Point Implementation of Convolutional Neural Networks for Image Classification. In 2018 International Conference on Advanced Technologies for Communications (ATC). 105--109 . Chun-Yan Lo, Francis C. M. Lau, and Chiu-Wing Sham. 2018. Fixed-Point Implementation of Convolutional Neural Networks for Image Classification. In 2018 International Conference on Advanced Technologies for Communications (ATC). 105--109."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2011.11.001"},{"key":"e_1_3_2_1_9_1","unstructured":"L. Ma Chiu-Wing Sham J. Sun and R. V. Tenorio. 2019. A Real-Time Flexible Telecommunication Decoding Architecture using FPGA Partial Reconfiguration. IEEE Transactions on Circuits and Systems II: Express Briefs (2019) 1--1.  L. Ma Chiu-Wing Sham J. Sun and R. V. Tenorio. 2019. A Real-Time Flexible Telecommunication Decoding Architecture using FPGA Partial Reconfiguration. IEEE Transactions on Circuits and Systems II: Express Briefs (2019) 1--1."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.102994"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN","author":"Yue Tai-Wen","year":"2000","unstructured":"Tai-Wen Yue and Suchen Chiang . 2000 . A neural network approach for visual cryptography . In Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing : New Challenges and Perspectives for the New Millennium, Vol. 5. 494--499 vol.5. Tai-Wen Yue and Suchen Chiang. 2000. A neural network approach for visual cryptography. In Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium, Vol. 5. 494--499 vol.5."},{"volume-title":"2019 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). 301--304","author":"Valencia R.","key":"e_1_3_2_1_12_1","unstructured":"R. Valencia , C. Sham , and O. Sinnen . 2019. Using Neuroevolved Binary Neural Networks to solve reinforcement learning environments . In 2019 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). 301--304 . R. Valencia, C. Sham, and O. Sinnen. 2019. Using Neuroevolved Binary Neural Networks to solve reinforcement learning environments. In 2019 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). 301--304."},{"volume-title":"Evolved Binary Neural Networks Through Harnessing FPGA Capabilities. In 2019 International Conference on Field-Programmable Technology (ICFPT). 395--398","author":"Valencia R.","key":"e_1_3_2_1_13_1","unstructured":"R. Valencia , C. W. Sham , and O. Sinnen . 2019 . Evolved Binary Neural Networks Through Harnessing FPGA Capabilities. In 2019 International Conference on Field-Programmable Technology (ICFPT). 395--398 . R. Valencia, C. W. Sham, and O. Sinnen. 2019. Evolved Binary Neural Networks Through Harnessing FPGA Capabilities. In 2019 International Conference on Field-Programmable Technology (ICFPT). 395--398."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2006.03.069"},{"key":"e_1_3_2_1_15_1","volume-title":"Neural Cryptography Based on the Topology Evolving Neural Networks. In 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). 472--478","author":"Zhu Y.","year":"2018","unstructured":"Y. Zhu , 2018 . Neural Cryptography Based on the Topology Evolving Neural Networks. In 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). 472--478 . Y. Zhu, et al. 2018. Neural Cryptography Based on the Topology Evolving Neural Networks. In 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). 472--478."}],"event":{"name":"GECCO '20: Genetic and Evolutionary Computation Conference","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation"],"location":"Canc\u00fan Mexico","acronym":"GECCO '20"},"container-title":["Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377929.3389933","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377929.3389933","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:39:00Z","timestamp":1750199940000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377929.3389933"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,8]]},"references-count":15,"alternative-id":["10.1145\/3377929.3389933","10.1145\/3377929"],"URL":"https:\/\/doi.org\/10.1145\/3377929.3389933","relation":{},"subject":[],"published":{"date-parts":[[2020,7,8]]},"assertion":[{"value":"2020-07-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}