{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T22:37:39Z","timestamp":1770158259985,"version":"3.49.0"},"reference-count":25,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2020,6,29]],"date-time":"2020-06-29T00:00:00Z","timestamp":1593388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2020,8,31]]},"abstract":"<jats:p>In order to overcome the problems of long encrypting time, low information availability, low information integrity and low encrypting efficiency when using the current method to encrypt the communication information in the network without constructing the sequence of communication information. This paper proposes a network communication information encryption algorithm based on binary logistic regression, analyses the development of computer architecture, builds a network communication model, layers the main body of information exchange, and realizes the information synchronization of device objects at all levels. Based on the binary Logistic regression model, network communication information sequence is generated, and the fusion tree is constructed by network communication information sequence. The network communication information is encrypted through system initialization stage, data preparation stage, data fusion stage and data validation stage. The experimental results show that the information availability of the proposed algorithm is high, and the maximum usability can reach 97.7%. The encryption efficiency is high, and the shortest encryption time is only 1.9\u200as, which fully shows that the proposed algorithm has high encryption performance.<\/jats:p>","DOI":"10.3233\/jifs-179936","type":"journal-article","created":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T15:38:15Z","timestamp":1598974695000},"page":"1627-1637","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Encryption algorithm for network communication information based on binary logistic regression"],"prefix":"10.1177","volume":"39","author":[{"given":"Bo","family":"Su","sequence":"first","affiliation":[{"name":"School of Aerospace Science and Technology, Xidian University, Xi\u2019an, China"}]},{"given":"Qingyue","family":"Yang","sequence":"additional","affiliation":[{"name":"Institute of Electronics, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Jinlong","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Aerospace Science and Technology, Xidian University, Xi\u2019an, China"}]},{"given":"Manjun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Network Technology Research Institute, China United Network Communications Co., Ltd, Beijing, China"}]}],"member":"179","published-online":{"date-parts":[[2020,6,29]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1364\/OE.24.001734"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-017-01248-2"},{"issue":"99","key":"e_1_3_2_4_2","first-page":"1","article-title":"Efficient Encryption from Random Quasi-Cyclic Codes","author":"Aguilar C.","year":"2016","unstructured":"AguilarC., BlazyO., DeneuvilleJ.C., et al., Efficient Encryption from Random Quasi-Cyclic Codes, IEEE Transactions on Information TheoryPP(99) (2016), 1\u20131.","journal-title":"IEEE Transactions on Information Theory"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2389959"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-016-2954-6"},{"issue":"75","key":"e_1_3_2_7_2","first-page":"142","article-title":"Two-dimensional Code Hierarchical Encryption Algorithm Based on Attribute Encryption","volume":"488","author":"Yang K.","year":"2018","unstructured":"YangK., YuanH.D., GuoY.B., Two-dimensional Code Hierarchical Encryption Algorithm Based on Attribute Encryption, Computer Engineering488(75) (2018), 142\u2013146.","journal-title":"Computer Engineering"},{"key":"e_1_3_2_8_2","first-page":"17","article-title":"Authenticated Encryption Based on SM4 Round Function","volume":"46","author":"Zhang J.","year":"2018","unstructured":"ZhangJ., WuW.L., Authenticated Encryption Based on SM4 Round Function, Acta Electronica Sinica46 (2018), 17\u201322.","journal-title":"Acta Electronica Sinica"},{"issue":"14","key":"e_1_3_2_9_2","first-page":"59","article-title":"Research on Location Information Hiding Method Based on Improved Genetic Algorithm","volume":"13","author":"Wang B.","year":"2018","unstructured":"WangB., ZhangL., ZhangG.Y., Research on Location Information Hiding Method Based on Improved Genetic Algorithm, Chinese Scientific Papers13(14) (2018), 59\u201363.","journal-title":"Chinese Scientific Papers"},{"issue":"31","key":"e_1_3_2_10_2","first-page":"42","article-title":"Self-synchronizing sequence cipher algorithm based on block encrypting synchronization information","volume":"36","author":"Zhang Y.J.","year":"2016","unstructured":"ZhangY.J., MaJ.M., WeiY.Y., Self-synchronizing sequence cipher algorithm based on block encrypting synchronization information, Journal of Computer Applications36(31) (2016), 42\u201345.","journal-title":"Journal of Computer Applications"},{"issue":"16","key":"e_1_3_2_11_2","first-page":"66","article-title":"High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving","volume":"55","author":"Qiu J.","year":"2016","unstructured":"QiuJ., LinZ., LiD., et al., High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving, Optical Engineering55(16) (2016), 66\u201371.","journal-title":"Optical Engineering"},{"issue":"5","key":"e_1_3_2_12_2","first-page":"21451","article-title":"Spy Must Be Spotted: A Multistimuli-Responsive Luminescent Material for Dynamic Multimodal Anticounterfeiting and Encryption","volume":"10","author":"Zhen Y.S.","year":"2018","unstructured":"ZhenY.S., JiaX.Y., LinW.H., et al., Spy Must Be Spotted: A Multistimuli-Responsive Luminescent Material for Dynamic Multimodal Anticounterfeiting and Encryption, ACS Applied Materials & Interfaces10(5) (2018), 21451\u201321457.","journal-title":"ACS Applied Materials & Interfaces"},{"issue":"21","key":"e_1_3_2_13_2","first-page":"3558","article-title":"Optimized random phase encryption","volume":"43","author":"Zea A.V.","year":"2018","unstructured":"ZeaA.V., RamirezJ.F.B., TorrobaR., Optimized random phase encryption, Optics Letters43(21) (2018), 3558\u20133562.","journal-title":"Optics Letters"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btw758"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2016.2615870"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1039\/C7CC00769H"},{"issue":"21","key":"e_1_3_2_17_2","first-page":"103","article-title":"Optical hyperspectral data encryption in spectrum domain by using 3D Arnold and gyrator transforms","volume":"49","author":"Hang C.","year":"2016","unstructured":"HangC., DuX., LiuZ., Optical hyperspectral data encryption in spectrum domain by using 3D Arnold and gyrator transforms, Spectroscopy Letters49(21) (2016), 103\u2013107.","journal-title":"Spectroscopy Letters"},{"issue":"35","key":"e_1_3_2_18_2","first-page":"2125","article-title":"International Data Encryption Algorithm","volume":"60","author":"Lai X.","year":"2016","unstructured":"LaiX., International Data Encryption Algorithm, Hepatology60(35) (2016), 2125\u20132126.","journal-title":"Hepatology"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2389959"},{"issue":"115","key":"e_1_3_2_20_2","first-page":"799","article-title":"Encry Scation: An Secure Approach for Data Security Using Encryption and Obfuscation Techniques for IaaS and DaaS Services in Cloud Environment","volume":"663","author":"Suthar K.","year":"2017","unstructured":"SutharK., PatelJ., Encry Scation: An Secure Approach for Data Security Using Encryption and Obfuscation Techniques for IaaS and DaaS Services in Cloud Environment, Astrophysical Journal663(115) (2017), 799\u2013807.","journal-title":"Astrophysical Journal"},{"issue":"17","key":"e_1_3_2_21_2","first-page":"65","article-title":"Optical approach for the efficient data volume handling in experimentally encrypted data","volume":"18","author":"Trejos S.","year":"2016","unstructured":"TrejosS., Fredy BarreraJ., VelezA. , et al., Optical approach for the efficient data volume handling in experimentally encrypted data, Journal of Optics18(17) (2016), 65\u201372.","journal-title":"Journal of Optics"},{"issue":"2","key":"e_1_3_2_22_2","first-page":"71","article-title":"Practical quantum computing on encrypted data","volume":"5","author":"Marshall K.","year":"2016","unstructured":"MarshallK., JacobsenC.S., SchafermeierC., et al. Practical quantum computing on encrypted data, Nature Communications5(2) (2016), 71\u201374.","journal-title":"Nature Communications"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2016.2585081"},{"issue":"20","key":"e_1_3_2_24_2","first-page":"127","article-title":"Simulation of Privacy Protection for Wireless Network Communication","volume":"35","author":"Feng W.G.","year":"2018","unstructured":"FengW.G., Simulation of Privacy Protection for Wireless Network Communication, Computer Simulation35(20) (2018), 127\u2013130.","journal-title":"Computer Simulation"},{"issue":"28","key":"e_1_3_2_25_2","first-page":"135","article-title":"Application Research of Three Kinds of Symmetric Encryption Algorithms in Wireless Block Center","volume":"61","author":"Yang J.","year":"2017","unstructured":"YangJ., Application Research of Three Kinds of Symmetric Encryption Algorithms in Wireless Block Center, Automation & Instrumentation61(28) (2017), 135\u2013137.","journal-title":"Automation & Instrumentation"},{"issue":"8","key":"e_1_3_2_26_2","first-page":"130","article-title":"Review of Quantum Secret Communication Technology","volume":"13","author":"Fan F.","year":"2018","unstructured":"FanF., WeiS.H., YangJ., et al., Review of Quantum Secret Communication Technology, Journal of China Academy of Electronics and Information Technology13(8) (2018), 130\u2013136.","journal-title":"Journal of China Academy of Electronics and Information Technology"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-179936","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-179936","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-179936","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T09:31:06Z","timestamp":1770111066000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-179936"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,29]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,8,31]]}},"alternative-id":["10.3233\/JIFS-179936"],"URL":"https:\/\/doi.org\/10.3233\/jifs-179936","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,29]]}}}